Search the Community
Showing results for tags 'extension'.
Hi there, I just made a small addition to Darren Kitchen's wait.sh for social engineering. If you have to social engineer your way to your target computer, you can just call "SEWAIT" at a suitable part of your payload. BB will be connected as STORAGE and you can download whatever file to your victim user and show it to him. BB will wait until you change the switch position and then start your original payload. Please be aware that if your payload utilizes "GET SWITCH_POSITION" you should call this before "SEWAIT"... Here is the link to the pull request: https://github.com/hak5/bashbunny-payloads/pull/327
So a new extension I wrote to avoid to have to escape special characters for complex powershells. This extension takes a text file containing the powershell command. Example: RUNPOWER switch1/pstxt.txt inside the pstxt.txt file : Set-WinUserLanguageList -LanguageList en-US -force; Basically it takes the contents of the text file and encodes it to a base64 string and passes it to powershell as an encoded command. (also works as obfuscation of the attack code) https://github.com/elkentaro/bashbunny-payloads/blob/master/library/extensions/runpower.sh @elkentaro
Hello Do not bother the I have a question I am looking for extension of them does not like the KGB that File Commnad You can just about 10 of these cases suggest me Of course I could not find by searching ... thank you