illwill 147a71fe4f Added browsercreds, wificreds, and mrrobot payloads (#114)
* Initial commit

HID Powershell attack to dump WiFiCreds

* Update readme.md

* changed initial LED blink color to white

* Changed initial LED color to white

* Changed initial LED Color to white

* swapped sync before LED

* switched from powershell to batch

* Update payload.txt

* using powershell again , updated version and LEDs

* using powershell, added usb eject,  Win 7,8,10

* added window resizing to hide payload typing

* Update payload.txt

* pull request

* BrowserCreds Pull

* separate powershell script called from payload

also added result detection

* update LEDs

* Update payload.txt

* initial commit

* Update payload.txt

* initial pull

* initial commit
2017-04-07 15:48:20 +10:00
..

MrRobot

alt tag

  • Author: illwill & tuxxy
  • Version: Version 0.2
  • Target: Windows

Description

Dumps the usernames & plaintext passwords from Windows boxes using Powershell in memory with Mimikatz then stashes them in /root/udisk/loot/MrRobot

Configuration

None needed.

STATUS

LED Status
Blue (blinking) Running Powershell / Waiting for WebServer
White (blinking) WebServer started and Uploading Results
Purple (blinking) DChecking for Results
Green Got Creds and copied to loot folder
Amber (blinking) MimiKatz failed (Not Admin?)
Red (blinking) No Creds / Mimikatz failed

Discussion

Hak5 Forum Thread