DigiSpark-Payloads/payloads/Windows Phisher/README.md

29 lines
1.1 KiB
Markdown
Raw Normal View History

2019-02-22 17:41:39 +00:00
# Windows Phisher
### Description:
#### Windows_Phisher.ino:<br>
Windows credential phisher, Works by running powershell script and pausing for 1 minute before asking for username and password. Popup only
goes away after valid credentials are given if so credentials are sent to webhook.site from where they can be later retrieved from remote
location. Orignal concept stolen from [Nishang](https://github.com/samratashok/nishang/blob/master/Gather/Invoke-CredentialsPhish.ps1)<br>
**Instructions:**<br>
Before using it make sure the WebHook.site hook is set in payload which you will find almost at the end of the script. Also the
current time is set for 1 minute you can increase the time to your requirement in "start-sleep -s" which you will find at the start of script.<br>
**Tested on:**<br>
**OS**: Windows 10|8|7<br>
**User**: Admin/Normal User<br>
**Hardware**: ATtiny85 (Chinese)
### Requirements:
**Password Grabber**: https://webhook.site/ or any other request reflector of your choice<br>
**Internet Access**
### Screenshot
<kbd>
<img src="https://i.ibb.co/Hh0jchC/pop.png">
</kbd><kbd>
<img src="https://i.ibb.co/rGVSVSg/site.png">
</kbd>