Jump to content

Michael Weinstein

Active Members
  • Posts

    17
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by Michael Weinstein

  1. 1 hour ago, Joe S said:

    Sorry about the guys I am head of the I.T.  department from the School District clarence was claiming to be A admin and I have revoked his USB rubber ducky land turtle and bash bunny from his person and thank you for linking me his twitch that we have been have been trying to find and he's going to be getting a pension for some of the stuff that he's titled it streams 

     

     

     

    thank you very much Joe S

     

    So we've had Eminem, Slim Shady... and this would be Marshall Mathers?

    https://getyarn.io/yarn-clip/ba393c1f-4166-443c-9f8c-5cb380b26ecf#SyInJJbNa-.copy

  2. Kid, don't run any ducky scripts anybody gives you here.  At this point, they're all going to be rm -rf / and fork bombs.

    Also, there's very little interesting stuff you can run on a chromebook that's not rooted and running... uh... not chromeOS.

  3. Taking the idea (again, mad props to sudoBackdoor) a bit further with some python scripting, I scared myself (and unintentionally pwned myself a few times as well) with this thing.

    How it works:

    The user's .bash_profile or .bashrc gets tweaked to point to ~/.config/sudo

    A python script called sudo is installed there.  [Patience is required here, as you need to wait for the user to sudo some command now] This will take their password, validate it by running its own sudo command (literally just echoing something) and seeing if it works

    Once it confirms a good password, it stores the password for later retrieval and executes the intended sudo command in a subshell that the user shouldn't even notice a difference in

    After executing their command, it will use the password to sudo open up a reverse https meterpreter session on the machine.  It will do this every time sudo is run.

    I unintentionally self pwned a few times, because the meterpreter session is being run as root, and one must sudo kill to get rid of it.  Sudo killing it will get rid of the existing session as expected, but then will open up a shiny new session as its last step (unless the python script is gone).

    Because antivirus tends to recognize the base64-encoded meterpreter payload as malicious, I also wrote a script called "shellSmuggler.py" to go with it.  If you use the msfvenom command I supply here, you should be able to pipe the output to the shellSmuggler and scramble the payload enough that antivirus doesn't alert on/block it anymore.  You will need to know your listening machine's IP and listening port (obviously).

    • Like 2
  4. oXis, I was debating about that one.  Truth be told, it's generally not installing packages.  The packages it tries to install usually come standard (except for sometimes paramiko) and if it can find them, it won't try to install them.  The main package it depends on is getpass to give a proper password prompt, but I think that's a standard python package now.  It's worked pretty well in testing, although I put it aside for a bit because I got another interesting idea.

    JediMasterX... check it out at the link.

  5. I decided to put together a payload to get myself familiar with the bunny.  This was inspired by SudoBackdoor and borrows heavily from it, but uses python because I'm more fluent in that than bash.

    I'm hoping to have this thing completed by the end of this week or possibly the weekend.

    The code under development is on my github at https://github.com/michael-weinstein/bashbunny-payloads/tree/darkCharlie/payloads/library/credentials/darkCharlie

×
×
  • Create New...