Update unicorn readme.md (#302)
parent
6345354375
commit
9011db7fae
|
@ -16,10 +16,8 @@ Configuring this payload is pretty time-consuming, but it's worth it.
|
|||
|
||||
1. Download Trustedsec's Unicorn: https://github.com/trustedsec/unicorn and use it to generate a powershell attack script.
|
||||
2. After you generate a powershell script, execute ```$ msfconsole -r unicorn.rc``` in the same directory in order to start the listener.
|
||||
3. Transfer **payload.txt** to any of your switches, then open it.
|
||||
4. Replace ```your_powershell_attack_here``` with the contents of your **powershell_attack.txt** file which was generated.
|
||||
5. Put a **\\** (backslash) before each special character (**\,** **\"** **\'** **\:** **\;** **\(** **\)** **\[** **\]** **\+**).
|
||||
6. Save the **payload.txt** file and eject Bash Bunny. You are good to go! Sessions will be opened in the metasploit's listener!
|
||||
3. You can use [this software(unicorn bash bunny payload generator)](https://github.com/Prodicode/bash-bunny-unicorn-payload-generator) to generate a **payload.txt** from the **powershell_attack.txt**.
|
||||
4. Transfer the **payload.txt** to one of the switches on the Bash Bunny. You're ready to go!
|
||||
|
||||
## Status
|
||||
|
||||
|
|
Loading…
Reference in New Issue