Cleanup: psh_DownloadExecSMB: Update Payload Header

Also Fix left over merge errors..
cleanup
Marc 2019-07-05 08:17:50 +01:00 committed by GitHub
parent a764a9e238
commit 377a5bc7b4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 13 additions and 17 deletions

View File

@ -4,26 +4,22 @@
# Author: LowValueTarget # Author: LowValueTarget
# Version: 2.0 # Version: 2.0
# Category: Powershell # Category: Powershell
# Target: Windows XP SP3+ (Powershell) # Target: Windows XP SP3+
# Attackmodes: HID, RNDIS_ETHERNET # Attack Modes: HID, RNDIS_ETHERNET
# Firmware: >= 1.2 # Firmware: >= 1.2
# Required Tools: impacket
# Description: Quick HID attack to retrieve and run powershell payload from BashBunny SMBServer.
# Possibilities are limitless! Credentials captured by are stored as loot.
# Ensure p.txt exists in payload directory (using .txt instead of .ps1 in case of security countermeasures)
# #
# Quick HID attack to retrieve and run powershell payload from BashBunny SMBServer. Possibilities are limitless! # LEDS:
# Credentials captured by are stored as loot. # Magenta: Setup
# Ensure p.txt exists in payload directory (using .txt instead of .ps1 in case of security countermeasures) # Yellow Single Blink: Powershell
# # Yellow Double Blink: Delivering powershell payload
# Required tools: impacket # White: Clean up
======= # Green: Finished
# Credentials captured by are stored as loot.
# Ensure p.txt exists in payload directory (using .txt instead of .ps1 in case of security countermeasures)
#
# Required tools: impacket
#
# | Attack Stage | Description |
# | ------------------- | ------------------------------|
# | Stage 1 | Powershell |
# | Stage 2 | Delivering powershell payload |
# #
ATTACKMODE RNDIS_ETHERNET HID ATTACKMODE RNDIS_ETHERNET HID
# SETUP # SETUP