Update readme.md

pull/301/head
C1PH3R 2018-01-24 22:12:29 +01:00 committed by GitHub
parent be875de57b
commit 1a21d9b3fd
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 16 additions and 16 deletions

View File

@ -4,24 +4,24 @@
* Creds: C1PH3R, Hak5Darren, Nirsoft
* Target: Windows
## Description
# Description
##Starts up multiple programs:
* Starts up multiple programs:
# BPG (BrowserPasswordGrabber): Grabs passwords from web browsers: Internet Explorer, Mozilla Firefox, Google Chrome, Safari, and Opera.
# BHG (BrowserHistoryGrabber): Grabs history from web browsers: Internet Explorer, Mozilla Firefox, Google Chrome, Safari, and Opera.
# InfoGrabber: Gather a lot of information about the computer and place it in a text file in loot/info/.
# Reverse-Shell: Copy's the file servicehost.txt to startup directory: shell:startup and executes it.
# Ip grabber.
* BPG (BrowserPasswordGrabber): Grabs passwords from web browsers: Internet Explorer, Mozilla Firefox, Google Chrome, Safari, and Opera.
* BHG (BrowserHistoryGrabber): Grabs history from web browsers: Internet Explorer, Mozilla Firefox, Google Chrome, Safari, and Opera.
* InfoGrabber: Gather a lot of information about the computer and place it in a text file in loot/info/.
* Reverse-Shell: Copy's the file servicehost.txt to startup directory: shell:startup and executes it.
* Ip grabber.
##Configuration:
#Optional: edit the "Delay CONFIGURATION" in payload file to your preferences to make the payload work with slower/older or faster/newer computers
#Optional: edit the "Shutting off CONFIGURATION" in the payload file to shut the bunny off after the payload is done
#Optional: edit the "Target ip CONFIGURATION" in the payload file to grab the ip of the victim
#Optional: edit the "Reverse shell CONFIGURATION" in the payload file to use reverse_shell
#When using a reverse_shell follow steps below
#Place a file servicehost.whatever in Bashbunny/payloads
#Replace the text: servicehost.txt in payload.txt file with servicehost.whatever (Whatever = the filetype you have selected as your reverse shell)
#Configuration:
*Optional: edit the "Delay CONFIGURATION" in payload file to your preferences to make the payload work with slower/older or faster/newer computers
*Optional: edit the "Shutting off CONFIGURATION" in the payload file to shut the bunny off after the payload is done
*Optional: edit the "Target ip CONFIGURATION" in the payload file to grab the ip of the victim
*Optional: edit the "Reverse shell CONFIGURATION" in the payload file to use reverse_shell
*When using a reverse_shell follow steps below
*Place a file servicehost.whatever in Bashbunny/payloads
*Replace the text: servicehost.txt in payload.txt file with servicehost.whatever (Whatever = the filetype you have selected as your reverse shell)
@ -32,6 +32,6 @@
| Green | Attack Complete |
| Red | Fail |
#No discussion jet!
* No discussion jet!
#"Don't look at the branch of the problem, look at the root! (C1PH3R)"