Cleanup: psh_DownloadExecSMB: Update Payload Header

Also Fix left over merge errors..
cleanup
Marc 2019-07-05 08:17:50 +01:00 committed by GitHub
parent a764a9e238
commit 377a5bc7b4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 13 additions and 17 deletions

View File

@ -4,26 +4,22 @@
# Author: LowValueTarget
# Version: 2.0
# Category: Powershell
# Target: Windows XP SP3+ (Powershell)
# Attackmodes: HID, RNDIS_ETHERNET
# Target: Windows XP SP3+
# Attack Modes: HID, RNDIS_ETHERNET
# Firmware: >= 1.2
# Required Tools: impacket
# Description: Quick HID attack to retrieve and run powershell payload from BashBunny SMBServer.
# Possibilities are limitless! Credentials captured by are stored as loot.
# Ensure p.txt exists in payload directory (using .txt instead of .ps1 in case of security countermeasures)
#
# Quick HID attack to retrieve and run powershell payload from BashBunny SMBServer. Possibilities are limitless!
# Credentials captured by are stored as loot.
# Ensure p.txt exists in payload directory (using .txt instead of .ps1 in case of security countermeasures)
#
# Required tools: impacket
=======
# Credentials captured by are stored as loot.
# Ensure p.txt exists in payload directory (using .txt instead of .ps1 in case of security countermeasures)
#
# Required tools: impacket
#
# | Attack Stage | Description |
# | ------------------- | ------------------------------|
# | Stage 1 | Powershell |
# | Stage 2 | Delivering powershell payload |
# LEDS:
# Magenta: Setup
# Yellow Single Blink: Powershell
# Yellow Double Blink: Delivering powershell payload
# White: Clean up
# Green: Finished
#
ATTACKMODE RNDIS_ETHERNET HID
# SETUP