Files
2024-05-28 19:34:18 +02:00
..
2024-05-28 19:34:18 +02:00
2022-05-09 15:00:43 -05:00
2024-05-28 19:34:18 +02:00

Title: ReverseBunnySSL

Author: 0i41E
OS: Windows
Version: 1.2
For input and inspiration - Thanks to: Cribbit, sebkinne

What is ReverseBunnySSL?

ReverseBunnySSL gets you remote access to your target in seconds.
Unlike ReverseBunny, ReverseBunnySSL offers encrypted traffic via OpenSSL.

Instruction:

!Insert the IP of your attacking machine & PORT into the payload.txt!
1. Create key.pem & cert.pem like so:
> openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes
It will ask for information about the certificate - Insert whatever you want.

  1. For catching the shell you need to start a listener, which supports encrypted traffic.
    I recommend openssl itself or ncat - Example syntax for both:

    openssl s_server -quiet -key key.pem -cert cert.pem -port [Port Number]
    ncat --listen -p [Port Number] --ssl --ssl-cert cert.pem --ssl-key key.pem

  2. Plug in Bunny, it will create a web server, and uses Invoke-Expression to execute the shell.

Disclaimer: Because of obfuscation, it may take some time until the shell is fully executed by powershell

alt text alt text