From e889c414d55c2c44765eecb266c300c246b0d4c6 Mon Sep 17 00:00:00 2001 From: "Mohamed A. Baset" Date: Thu, 11 Jul 2019 17:58:20 -0500 Subject: [PATCH] Update payload.txt Adding the payload header! --- .../credentials/SMBruteBunny/payload.txt | 23 ++++++++++++++++--- 1 file changed, 20 insertions(+), 3 deletions(-) diff --git a/payloads/library/credentials/SMBruteBunny/payload.txt b/payloads/library/credentials/SMBruteBunny/payload.txt index 965fc27c..40fcf6b3 100644 --- a/payloads/library/credentials/SMBruteBunny/payload.txt +++ b/payloads/library/credentials/SMBruteBunny/payload.txt @@ -1,8 +1,25 @@ #!/bin/bash # -# Title: SMBruteBunny -# Author: Mohamed A. Baset (@SymbianSyMoh) -# PS: This is the shittiest bash script you'll ever see :D +# Title: SMBruteBunny +# Author: Mohamed A. Baset (@SymbianSyMoh) +# Version: 1.0 +# Targets: Windows +# Attack Modes: HID, RNDIS_ETHERNET +# Description: Bruteforces open Windows SMB protocol for valid Credentials against the bruteforce +# dictionnary stored in variables "$user_bruteforce_list" and "$pass_bruteforce_list" +# then dump the results in text file stored in variable "$password_process_file" then +# check for valid or invalid credentials, if valid creds found, store it loot in varaible +# "$password_loot_file" then quack it to unlock the machine. +# +# LEDS: +# LED SETUP: Script Setup Stage. +# LED STAGE1: Script Stage1 Initialized "Bruteforcing the open SMB for valid Credentials". +# LED STAGE2: Script Stage2 Initialized "Checking Bruteforce results". +# LED G: SMB Credentials Found. +# LED FAIL: SMB Credentials Not Found. +# LED CLEANUP: Cleaning up and Syncing filesystem. +# LED FINISH: Finished. + # Setup LED SETUP