Tristan Mahé 80d622e16e Added Win93 prank payload (#231)
* win93 payload initial release

* readme.md: added TODO

* payload.txt: corrected the command, no need to escape everything

* initial windows support
2017-07-10 07:28:11 +10:00

36 lines
1.5 KiB
Markdown
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Win93 Prank
* Author: gled
* Version: Version 0.1
* Target: Linux or MacOS ( tested on Linux only, with Chromium installed ), Windows planned
## Description
- First, uses a Ethernet Attack to run an OS detection via NMAP
- Second, uses a HID Attack to launch a fullscreen browser pointing to www.windows93.net
- leaves a log and the last nmap scan result in $LOOTDIR/win93
## Configuration
None needed but:
- you can set the default OS if nmap scan fail to detect ( set DEFAULT_OS to MAC or LINUX )
## STATUS
| LED | Status |
| ------------------ | ------------------------------------------------------- |
| Magenta (solid) | Setting up |
| Yellow (blinking1) | Nmap scan in progress,Ethernet Attack |
| Yellow (blinking2) | Os Detection running, remounted as HID |
| Yellow (blinking3) | HID attack in progress on the detected OS |
| Cyan (blinking) | HID attack in progress on the DEFAULT_OS, detect failed |
| White (blinking) | Cleaning up and syncin |
| Green (solid) | Finished, safe to remove the BB |
| Red (blinking) | Error, check the logs |
## Discussion
None yet
## TODO
Relaunch the attack in RDNIS_ETHERNET if no ip has been found previously, to start supporting windows too.