Updated payload for SJC
parent
1302d2cda7
commit
e768c62a84
|
@ -2,10 +2,10 @@
|
|||
#
|
||||
# Title: Sample Nmap Payload for Shark Jack
|
||||
# Author: Hak5
|
||||
# Version: 1.1
|
||||
# Version: 1.2
|
||||
#
|
||||
# Scans target subnet with Nmap using specified options. Saves each scan result
|
||||
# to loot storage folder.
|
||||
# to loot storage folder. Includes SERIAL_WRITE commands for Shark Jack Cable.
|
||||
#
|
||||
# LED SETUP ... Obtaining IP address from DHCP
|
||||
# LED ATTACK ... Scanning
|
||||
|
@ -14,20 +14,29 @@
|
|||
# See nmap --help for options. Default "-sP" ping scans the address space for
|
||||
# fast host discovery.
|
||||
|
||||
|
||||
echo "started payload" > /tmp/payload-debug.log
|
||||
NMAP_OPTIONS="-sP --host-timeout 30s --max-retries 3"
|
||||
LOOT_DIR=/root/loot/nmap
|
||||
|
||||
# Setup loot directory, DHCP client, and determine subnet
|
||||
LED SETUP
|
||||
mkdir -p $LOOT_DIR
|
||||
SERIAL_WRITE [*] Setting up payload
|
||||
LED SETUP
|
||||
mkdir -p $LOOT_DIR
|
||||
COUNT=$(($(ls -l $LOOT_DIR/*.txt | wc -l)+1))
|
||||
NETMODE DHCP_CLIENT
|
||||
while [ -z "$SUBNET" ]; do
|
||||
NETMODE DHCP_CLIENT
|
||||
SERIAL_WRITE [*] Waiting for IP from DHCP
|
||||
while [ -z "$SUBNET" ]; do
|
||||
sleep 1 && SUBNET=$(ip addr | grep -i eth0 | grep -i inet | grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}[\/]{1}[0-9]{1,2}" | sed 's/\.[0-9]*\//\.0\//')
|
||||
done
|
||||
|
||||
# Scan network
|
||||
LED ATTACK
|
||||
done
|
||||
echo "Recieved IP address from DHCP" >> /tmp/payload-debug.log
|
||||
|
||||
|
||||
# Scan network
|
||||
LED ATTACK
|
||||
SERIAL_WRITE [*] Starting nmap scan...
|
||||
nmap $NMAP_OPTIONS $SUBNET -oN $LOOT_DIR/nmap-scan_$COUNT.txt
|
||||
LED FINISH
|
||||
sleep 2 && halt
|
||||
echo "scanned network" >> /tmp/payload-debug.log
|
||||
LED FINISH
|
||||
SERIAL_WRITE [*] Payload complete!
|
||||
sleep 2 && sync
|
||||
|
|
Loading…
Reference in New Issue