bashbunny-payloads/payloads/library/remote_access/Hershell_MacLinuxWindows_Re...
metalkey ee48a74dc6 Added readme (#337)
Updated author details
2018-06-04 13:31:43 +10:00
..
README.md Added readme (#337) 2018-06-04 13:31:43 +10:00
payload.txt Added readme (#337) 2018-06-04 13:31:43 +10:00

README.md

Hershell Encrypted Reverse Shell (Cross-platform - Manual Mode)

Author: metalkey
Creds: Ronan Kervella (Creator of Hershell)
Version: Version 0.5

Instructions

Hershell Github: https://github.com/sysdream/hershell (read all instructions on Hershell git before starting)

  1. Compile all payloads and place binaries in the payloads\$SWITCH_POSITION directory (Double check binary names. Defaults are mac32, linux32, win32.exe)
  2. Uncomment desired target OS payload lines and ensure others are commented out
  3. Start ncat listener on your attacking machine, that is to receive the reverse shell (e.g. ncat --ssl --ssl-cert server.pem --ssl-key server.key -lvp 4343)
  4. Execute attack via Bash Bunny