usbrubberducky-payloads/payloads/library/exfiltration/Windows-Privilege-Excalibur
PlumpyTurkey da3191f6f2 Updates version badge 2024-07-12 16:51:33 +02:00
..
README.md Updates version badge 2024-07-12 16:51:33 +02:00
payload.txt Updates extensions 2024-07-12 16:46:13 +02:00
script.ps1 Small updates 2024-06-02 13:25:50 +02:00

README.md

Windows Privilege Excalibur

VIEW ON: HAK5 PAYLOADSTUDIO TARGET: WINDOWS 10, 11 VERSION: 1.4

This payload sends you a brief user privilege escalation report via Dropbox. Once you have the report, you can perform further privilege escalation analysis, including using the following resources:

Report Category Useful Resources
System Information WES-NG
User Information Priv2Admin
Stored Credentials
Installed Programs Exploit Database & Packet Storm

Process

  1. Detects when the USB Rubber Ducky is ready and whether the target operating system is Windows.
  2. Opens a Windows Run dialog box.
  3. Executes a hosted PowerShell script that performs the following actions:
  • Clears the history of the Windows Run menu.
  • Prepares a report on target PC user privilege escalation.
  • Sends the report to a file in your Dropbox.

Prerequisites

First of all, you need to set up an appropriate Dropbox exfiltration "App" to obtain your "app key", "app secret" and "refresh token", which you can do by following the quick tutorial available here. Once you get them, you need to download the "script.ps1" file for this payload and edit it to add the values for your "App". Once you've done that, all you need to do is host the modified file and make it downloadable from a URL that you set as an option for this payload.

[!WARNING] If you're using Dropbox to host your script, make sure the download link for your script ends with "dl=1" and not "dl=0".

Options

Required extension options Extension Data type Default value Description
RHP_SCRIPT_URL Run Hosted PowerShell String example.com Your PowerShell script download link

Contributors