parent
d387f4e185
commit
e889c414d5
|
@ -1,8 +1,25 @@
|
|||
#!/bin/bash
|
||||
#
|
||||
# Title: SMBruteBunny
|
||||
# Author: Mohamed A. Baset (@SymbianSyMoh)
|
||||
# PS: This is the shittiest bash script you'll ever see :D
|
||||
# Title: SMBruteBunny
|
||||
# Author: Mohamed A. Baset (@SymbianSyMoh)
|
||||
# Version: 1.0
|
||||
# Targets: Windows
|
||||
# Attack Modes: HID, RNDIS_ETHERNET
|
||||
# Description: Bruteforces open Windows SMB protocol for valid Credentials against the bruteforce
|
||||
# dictionnary stored in variables "$user_bruteforce_list" and "$pass_bruteforce_list"
|
||||
# then dump the results in text file stored in variable "$password_process_file" then
|
||||
# check for valid or invalid credentials, if valid creds found, store it loot in varaible
|
||||
# "$password_loot_file" then quack it to unlock the machine.
|
||||
#
|
||||
# LEDS:
|
||||
# LED SETUP: Script Setup Stage.
|
||||
# LED STAGE1: Script Stage1 Initialized "Bruteforcing the open SMB for valid Credentials".
|
||||
# LED STAGE2: Script Stage2 Initialized "Checking Bruteforce results".
|
||||
# LED G: SMB Credentials Found.
|
||||
# LED FAIL: SMB Credentials Not Found.
|
||||
# LED CLEANUP: Cleaning up and Syncing filesystem.
|
||||
# LED FINISH: Finished.
|
||||
|
||||
|
||||
# Setup
|
||||
LED SETUP
|
||||
|
|
Loading…
Reference in New Issue