Update payload.txt

Adding the payload header!
pull/383/head
Mohamed A. Baset 2019-07-11 17:58:20 -05:00 committed by GitHub
parent d387f4e185
commit e889c414d5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 20 additions and 3 deletions

View File

@ -1,8 +1,25 @@
#!/bin/bash
#
# Title: SMBruteBunny
# Author: Mohamed A. Baset (@SymbianSyMoh)
# PS: This is the shittiest bash script you'll ever see :D
# Title: SMBruteBunny
# Author: Mohamed A. Baset (@SymbianSyMoh)
# Version: 1.0
# Targets: Windows
# Attack Modes: HID, RNDIS_ETHERNET
# Description: Bruteforces open Windows SMB protocol for valid Credentials against the bruteforce
# dictionnary stored in variables "$user_bruteforce_list" and "$pass_bruteforce_list"
# then dump the results in text file stored in variable "$password_process_file" then
# check for valid or invalid credentials, if valid creds found, store it loot in varaible
# "$password_loot_file" then quack it to unlock the machine.
#
# LEDS:
# LED SETUP: Script Setup Stage.
# LED STAGE1: Script Stage1 Initialized "Bruteforcing the open SMB for valid Credentials".
# LED STAGE2: Script Stage2 Initialized "Checking Bruteforce results".
# LED G: SMB Credentials Found.
# LED FAIL: SMB Credentials Not Found.
# LED CLEANUP: Cleaning up and Syncing filesystem.
# LED FINISH: Finished.
# Setup
LED SETUP