Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

added Disclaimer #539

Merged
merged 70 commits into from
Jul 14, 2022
Merged

added Disclaimer #539

merged 70 commits into from
Jul 14, 2022

Conversation

0i41E
Copy link
Contributor

@0i41E 0i41E commented Jul 2, 2022

Added disclaimer about the usage of samdump2

0i41E added 30 commits September 7, 2021 18:37
Obfuscated reverse shell via powershell
Get your targets stored wifi information and credentials, store them on your Bashbunny and hop away 🐇
Changed payload to evade Windows Defender
Added new "Eject Method" - props to Night(9o3)
Deleted because of higher risk to get caught by AV
Updated ReverseBunny to version 1.2.
- Deleted payload on disk because of AV
- Added custom shell design
Updated README for ReverseBunny update
fixed some stupid left overs <3
a reverse shell using icmp
A reverse shell using icmp
…ds/library/remote_access/PingZhellBunny/Bunny.pl
…ayloads/library/remote_access/PingZhellBunny/PingZhell.ps1
…ads/library/remote_access/PingZhellBunny/README.md
…loads/library/remote_access/PingZhellBunny/payload.txt
0i41E added 29 commits February 2, 2022 09:21
Fixed wrong DELAY commands
Fixed multiple mistakes
Use your BashBunny to dump the user hashes of your target - similar to the msf post-module.
The script was obfuscated with multiple layers, so don't be confused.
If you don't trust this script, run it within a save testing space - which should be best practice anyways ;)
Utilize SessionGopher (Slightly modified) to find PuTTY, WinSCP, and Remote Desktop saved sessions. It decrypts saved passwords for WinSCP.
Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords.

Afterwards decide which is important and what you want to save onto your BashBunny.
Utilize the famous, here slightly modified SessionGopher script, to find PuTTY, WinSCP, and Remote Desktop saved sessions. It decrypts saved passwords for WinSCP.
Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords.

Decide which inforamtion you wanna take with you - save it onto your BashBunny!
Dump lsass with this rewritten and for BashBunny adapted version of Powersploits Out-MiniDump.
added disclaimer
Dumps users sam & system hive, which can be used later to extract the users hashes
Added disclaimer about samdump2
@hak5darren hak5darren merged commit 0bc2dad into hak5:master Jul 14, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants