mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
About:
- Title: sudoSnatch
- Description: sudoSnatch grabs plain text passwords remotely/locally.
- AUTHOR: drapl0n
- Version: 1.0
- Category: Credentials
- Target: Unix-like operating systems with systemd.
- Attackmodes: HID, Storage
sudoSnatch: sudoSnatch payload grabs sudo password in plain text(imediately after victim uses sudo command) and sends it back to attacker remotely/locally.
Features:
- Plain text passwords.
- Detailed password logs.
- Persistent
- Autostart payload on boot.
Workflow:
- Injecting payload on target's system.
- Checks whether internet is connected to the target system.
- If internet is connected then it sends clear text passwords to attacker.
Changes to be made in payload.sh:
- Replace ip(0.0.0.0) and port number(4444) with your servers ip address and port number on line no
10. - Increase/Decrease time interval to restart service periodically (Default is 15 mins), on line no
14.
LED Status:
SETUP: MAGENTAATTACK: YELLOWFINISH: GREEN
Directory Structure of payload components:
| FileName | Directory |
|---|---|
| payload.txt | /payloads/switch1/ |
| payload.sh | /payloads/ |
| shell | /payloads/library/sudoSnatch/ |
| systemMgr | /payloads/library/sudoSnatch/ |
- Note: Create directory named
sudoSnatchin/payloads/library/
Usage:
- Inject payload into target's system.
- Start netcat listner on attacking system:
nc -l -p <port number>use this command to fetch passwords.