From a287f4c9b9b10c7a5e94172b5e9dcf793428552b Mon Sep 17 00:00:00 2001 From: C1PH3R Date: Mon, 11 Dec 2017 14:19:19 +0100 Subject: [PATCH] Add files via upload --- .../USB PWNR/Payloads-Readme-s/readme-BHG.md | 21 +++++ .../USB PWNR/Payloads-Readme-s/readme-BPG.md | 21 +++++ .../Payloads-Readme-s/readme-InfoGrabber.md | 82 +++++++++++++++++++ .../Payloads-Readme-s/readme-reverse-shell.md | 23 ++++++ 4 files changed, 147 insertions(+) create mode 100644 payloads/library/USB PWNR/Payloads-Readme-s/readme-BHG.md create mode 100644 payloads/library/USB PWNR/Payloads-Readme-s/readme-BPG.md create mode 100644 payloads/library/USB PWNR/Payloads-Readme-s/readme-InfoGrabber.md create mode 100644 payloads/library/USB PWNR/Payloads-Readme-s/readme-reverse-shell.md diff --git a/payloads/library/USB PWNR/Payloads-Readme-s/readme-BHG.md b/payloads/library/USB PWNR/Payloads-Readme-s/readme-BHG.md new file mode 100644 index 00000000..74c78bf3 --- /dev/null +++ b/payloads/library/USB PWNR/Payloads-Readme-s/readme-BHG.md @@ -0,0 +1,21 @@ +# BPG (BrowserHistoryGrabber) + +* Author: speedy22013 +* Creds: speedy22013, Nirsoft +* Target: Windows + +## Description + +Grabs history from web browsers: Internet Explorer, Mozilla Firefox, Google Chrome, Safari, and Opera. +This payload is quick and takes about 15 seconds after insertion + +#No configuration needed + + +| LED | Status | +| ------------------ | -------------------------------------------- | +| Amber | Attack Setup | +| Green | Attack Complete | + +#No discussion jet! + diff --git a/payloads/library/USB PWNR/Payloads-Readme-s/readme-BPG.md b/payloads/library/USB PWNR/Payloads-Readme-s/readme-BPG.md new file mode 100644 index 00000000..c012b6a9 --- /dev/null +++ b/payloads/library/USB PWNR/Payloads-Readme-s/readme-BPG.md @@ -0,0 +1,21 @@ +# BPG (BrowserPasswordGrabber) + +* Author: speedy22013 +* Creds: speedy22013, Nirsoft +* Target: Windows + +## Description + +Grabs passwords from web browsers: Internet Explorer, Mozilla Firefox, Google Chrome, Safari, and Opera. +This payload is quick and takes about 15 seconds after insertion + +#No configuration needed + + +| LED | Status | +| ------------------ | -------------------------------------------- | +| Amber | Attack Setup | +| Green | Attack Complete | + +#No discussion jet! + diff --git a/payloads/library/USB PWNR/Payloads-Readme-s/readme-InfoGrabber.md b/payloads/library/USB PWNR/Payloads-Readme-s/readme-InfoGrabber.md new file mode 100644 index 00000000..e9a63421 --- /dev/null +++ b/payloads/library/USB PWNR/Payloads-Readme-s/readme-InfoGrabber.md @@ -0,0 +1,82 @@ +# Info Grabber for the BashBunny + +Original Author Simen Kjeserud + +V2.0 Author: DannyK999 + +Version: Version 2.0 + +Credit: Hak5Darren, Hak5 and Simen Kjeserud for inspiration + + + ((`\ + ___ \\ '--._ + .'` `' o ) + / \ '. __.' + _| /_ \ \_\_ + {_\______\-'\__\_\ + Check out Simen's website: + aknemis.com + +## Description + +Gather a lot of information about the computer and place it in a text file in loot/info/. + +Updates include code/output cleanup, faster runtime, and more veiled execution. + +Here you can se what it will look like: + + + System Information for: DESKTOP-9BVPPVN + + Manufacturer: Dell Inc. + + Model: XPS 13 9360 + + Serial Number: ******* + + CPU: Intel(R) Core(TM) i7-7500U CPU @ 2.70GHz + + HDD Capacity: 464.38GB + + HDD Space: 82.32 % Free (382.28GB) + + RAM: 15.89GB + + Operating System: Microsoft Windows 10 Home, Service Pack: 0 + + User logged In: DESKTOP-9BVPPVN\aknem + + Last Reboot: 02/21/2017 19:49:30 + + Computers MAC adress: **************** + + Computers IP adress: *********** + + Public IP adress: **************** + + RDP: RDP is NOT enabled + + + | ProfileName | SSID | Password | + | ---------------- | ------------------------------------- | ------------------------------------- | + | privatsna11234 | privatsna11234 | ******** | + | privatsna11234 | privatsna11234 | ******** | + + + +## Configuration + +Made for windows. The only thing you will need to change is the Ducky language so it matches the keyboard input. + +## STATUS + +| LED | Status | +| ---------------- | ------------------------------------- | +| Purple (blinking)| Attack in progress | +| Green | Attack Finished | + + + +## Discussion (Not yet created) +[Hak5 Forum Thread not yet created](https://forums.hak5.org/index.php?/topic/ "Hak5 Forum Thread") diff --git a/payloads/library/USB PWNR/Payloads-Readme-s/readme-reverse-shell.md b/payloads/library/USB PWNR/Payloads-Readme-s/readme-reverse-shell.md new file mode 100644 index 00000000..b0103e0f --- /dev/null +++ b/payloads/library/USB PWNR/Payloads-Readme-s/readme-reverse-shell.md @@ -0,0 +1,23 @@ +# Reverse-Shell + +* Author: speedy22013 +* Creds: speedy22013 +* Target: Windows + +## Description + +Copy's the file servicehost.txt to startup directory: shell:startup and executes it. + +##Configruation +#Place a file servicehost.whatever in Bashbunny/payloads +#Replace the text: servicehost.txt in payload.txt as well as in the copy-reverse.txt file with servicehost.whatever +#(Whatever) = the filetype you have selected as your reverse shell + + +| LED | Status | +| ------------------ | -------------------------------------------- | +| Amber | Attack Setup | +| Green | Attack Complete | + +#No discussion jet! +