mirror of
https://github.com/hak5darren/bashbunny-payloads.git
synced 2025-10-29 16:58:12 +00:00
* win93 payload initial release * readme.md: added TODO * payload.txt: corrected the command, no need to escape everything * initial windows support
36 lines
1.5 KiB
Markdown
36 lines
1.5 KiB
Markdown
# Win93 Prank
|
||
* Author: gled
|
||
* Version: Version 0.1
|
||
* Target: Linux or MacOS ( tested on Linux only, with Chromium installed ), Windows planned
|
||
|
||
## Description
|
||
|
||
- First, uses a Ethernet Attack to run an OS detection via NMAP
|
||
- Second, uses a HID Attack to launch a fullscreen browser pointing to www.windows93.net
|
||
- leaves a log and the last nmap scan result in $LOOTDIR/win93
|
||
|
||
## Configuration
|
||
|
||
None needed but:
|
||
- you can set the default OS if nmap scan fail to detect ( set DEFAULT_OS to MAC or LINUX )
|
||
|
||
## STATUS
|
||
|
||
| LED | Status |
|
||
| ------------------ | ------------------------------------------------------- |
|
||
| Magenta (solid) | Setting up |
|
||
| Yellow (blinking1) | Nmap scan in progress,Ethernet Attack |
|
||
| Yellow (blinking2) | Os Detection running, remounted as HID |
|
||
| Yellow (blinking3) | HID attack in progress on the detected OS |
|
||
| Cyan (blinking) | HID attack in progress on the DEFAULT_OS, detect failed |
|
||
| White (blinking) | Cleaning up and syncin |
|
||
| Green (solid) | Finished, safe to remove the BB |
|
||
| Red (blinking) | Error, check the logs |
|
||
|
||
|
||
## Discussion
|
||
None yet
|
||
|
||
## TODO
|
||
Relaunch the attack in RDNIS_ETHERNET if no ip has been found previously, to start supporting windows too.
|