bashbunny-payloads/payloads/library/recon/sFTP_Directory_Grabber
Darren Kitchen 1b042f6f2d Moved sFTP Directory Grabber payload to recon directory 2021-08-24 09:38:52 -05:00
..
d.cmd Moved sFTP Directory Grabber payload to recon directory 2021-08-24 09:38:52 -05:00
e.cmd Moved sFTP Directory Grabber payload to recon directory 2021-08-24 09:38:52 -05:00
i.vbs Moved sFTP Directory Grabber payload to recon directory 2021-08-24 09:38:52 -05:00
payload.txt Moved sFTP Directory Grabber payload to recon directory 2021-08-24 09:38:52 -05:00
readme.md Moved sFTP Directory Grabber payload to recon directory 2021-08-24 09:38:52 -05:00

readme.md

ExecutableInstaller with sftp recursive directory grab for Bash Bunnys

  • Author: IMcPwn
  • Revision for SFTP: Mule Skinner
  • Version: Version 1.0
  • Target: Windows
  • NOTICE: HAK5 is not responsible for the execution of 3rd party binaries!

Description

Copies psFTP.exe from the Bash Bunny USB Mass Storage root directory to %TEMP% and then executes with parameters in the e.cmd.

Configuration

By default the staged payload copies the payload psFTP.exe from the root of the Bash Bunnyand executes it via e.cmd. The payload copies to %TEMP%, change this to wherever you like by editing e.cmd. You may also copy a payload inside a directory, see comments in e.cmd. Make changes to e.cmd for your sFTP user@domain.com, sFTP password, sftp directory for loot and target machine directory for loot to be taken from. Variables are as follows:

sftphost=username@hostname.domain.com sftppass=password lootfrom=c:\users\username\documents looto=/loot

IMPORTANT:

To Download psftp.exe please use one of the links below:

32-Bit Version: https://the.earth.li/~sgtatham/putty/latest/w32/psftp.exe

64-Bit Version: https://the.earth.li/~sgtatham/putty/latest/w64/psftp.exe

Once downloaded, please copy psFTP.exe to the root of the bash bunny before attempting to use this payload.

STATUS

LED Status
Red Attack Setup
Green Attack Complete

Discussion

Hak5 Forum Thread