Cleanup: psh_DownloadExecSMB: Update Payload Header
Also Fix left over merge errors..cleanup
parent
a764a9e238
commit
377a5bc7b4
|
@ -4,26 +4,22 @@
|
||||||
# Author: LowValueTarget
|
# Author: LowValueTarget
|
||||||
# Version: 2.0
|
# Version: 2.0
|
||||||
# Category: Powershell
|
# Category: Powershell
|
||||||
# Target: Windows XP SP3+ (Powershell)
|
# Target: Windows XP SP3+
|
||||||
# Attackmodes: HID, RNDIS_ETHERNET
|
# Attack Modes: HID, RNDIS_ETHERNET
|
||||||
# Firmware: >= 1.2
|
# Firmware: >= 1.2
|
||||||
|
# Required Tools: impacket
|
||||||
|
# Description: Quick HID attack to retrieve and run powershell payload from BashBunny SMBServer.
|
||||||
|
# Possibilities are limitless! Credentials captured by are stored as loot.
|
||||||
|
# Ensure p.txt exists in payload directory (using .txt instead of .ps1 in case of security countermeasures)
|
||||||
#
|
#
|
||||||
# Quick HID attack to retrieve and run powershell payload from BashBunny SMBServer. Possibilities are limitless!
|
# LEDS:
|
||||||
# Credentials captured by are stored as loot.
|
# Magenta: Setup
|
||||||
# Ensure p.txt exists in payload directory (using .txt instead of .ps1 in case of security countermeasures)
|
# Yellow Single Blink: Powershell
|
||||||
#
|
# Yellow Double Blink: Delivering powershell payload
|
||||||
# Required tools: impacket
|
# White: Clean up
|
||||||
=======
|
# Green: Finished
|
||||||
# Credentials captured by are stored as loot.
|
|
||||||
# Ensure p.txt exists in payload directory (using .txt instead of .ps1 in case of security countermeasures)
|
|
||||||
#
|
|
||||||
# Required tools: impacket
|
|
||||||
#
|
|
||||||
# | Attack Stage | Description |
|
|
||||||
# | ------------------- | ------------------------------|
|
|
||||||
# | Stage 1 | Powershell |
|
|
||||||
# | Stage 2 | Delivering powershell payload |
|
|
||||||
#
|
#
|
||||||
|
|
||||||
ATTACKMODE RNDIS_ETHERNET HID
|
ATTACKMODE RNDIS_ETHERNET HID
|
||||||
|
|
||||||
# SETUP
|
# SETUP
|
||||||
|
|
Loading…
Reference in New Issue