bashbunny-payloads/SessionBunny
0iphor13 244dbec1eb
Uploaded SessionBunny
Utilize the famous, here slightly modified SessionGopher script, to find PuTTY, WinSCP, and Remote Desktop saved sessions. It decrypts saved passwords for WinSCP.
Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords.

Decide which inforamtion you wanna take with you - save it onto your BashBunny!
2022-02-11 19:06:06 +01:00
..
README.md Uploaded SessionBunny 2022-02-11 19:06:06 +01:00
SessionBunny.ps1 Uploaded SessionBunny 2022-02-11 19:06:06 +01:00
censorepic.png Uploaded SessionBunny 2022-02-11 19:06:06 +01:00
payload.txt Uploaded SessionBunny 2022-02-11 19:06:06 +01:00

README.md

Title: SessionBunny

Author: 0iphor13 Credit for SessionGopher: Brandon Arvanaghi

Version: 1.0

Instruction:

This payload will run the famous SessionGopher script, which was only slightly modified. Searches for PuTTY, WinSCP, and Remote Desktop saved sessions, decrypts saved passwords for WinSCP, Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords. After you recieve the information, save the items you are interested in simply on your BashBunny.

Instruction:

Place SessionBunny.ps1 in the same payload switch-folder as your payload.txt

Plug in BashBunny. Wait for the script to finish and decide what you wanna do with the information gathered alt text