commit
ee2372dc4c
|
@ -0,0 +1,19 @@
|
|||
# Title: Canary Duck
|
||||
# Description: Opens hidden powershell and connects to canary webserver using Invoke-WebRequest alerting you to spies and snoops.
|
||||
# Author: Jessie Crimson Hart
|
||||
# Props: Hak5, Thinkst
|
||||
# Version: 1.0
|
||||
# Category: General
|
||||
# Target: Windows 10 (Powershell)
|
||||
# Attackmodes: HID
|
||||
DELAY 1000
|
||||
GUI r
|
||||
DELAY 100
|
||||
REM Run a hidden powershell
|
||||
STRING powershell -windowstyle hidden
|
||||
ENTER
|
||||
REM make sure powershell is open by waiting for 1 second.
|
||||
DELAY 1000
|
||||
REM Open IE and connect to canary site. Replace the URL with the URL of your canary token from http://canarytokens.com
|
||||
STRING powershell -NoP -NonI -W Hidden -Exec Bypass Invoke-WebRequest "[CANARY URL HERE]"
|
||||
ENTER
|
Loading…
Reference in New Issue