Update unicorn readme.md (#302)

pull/319/head
Tudor Gheorghiu 2018-01-28 01:27:46 +02:00 committed by Sebastian Kinne
parent 6345354375
commit 9011db7fae
1 changed files with 2 additions and 4 deletions

View File

@ -16,10 +16,8 @@ Configuring this payload is pretty time-consuming, but it's worth it.
1. Download Trustedsec's Unicorn: https://github.com/trustedsec/unicorn and use it to generate a powershell attack script.
2. After you generate a powershell script, execute ```$ msfconsole -r unicorn.rc``` in the same directory in order to start the listener.
3. Transfer **payload.txt** to any of your switches, then open it.
4. Replace ```your_powershell_attack_here``` with the contents of your **powershell_attack.txt** file which was generated.
5. Put a **\\** (backslash) before each special character (**\,** **\"** **\'** **\:** **\;** **\(** **\)** **\[** **\]** **\+**).
6. Save the **payload.txt** file and eject Bash Bunny. You are good to go! Sessions will be opened in the metasploit's listener!
3. You can use [this software(unicorn bash bunny payload generator)](https://github.com/Prodicode/bash-bunny-unicorn-payload-generator) to generate a **payload.txt** from the **powershell_attack.txt**.
4. Transfer the **payload.txt** to one of the switches on the Bash Bunny. You're ready to go!
## Status