Title: ReverseBunnySSL
Author: 0i41E
OS: Windows
Version: 1.2
For input and inspiration - Thanks to: Cribbit, sebkinne
What is ReverseBunnySSL?
ReverseBunnySSL gets you remote access to your target in seconds.
Unlike ReverseBunny, ReverseBunnySSL offers encrypted traffic via OpenSSL.
Instruction:
!Insert the IP of your attacking machine & PORT into the payload.txt!
1. Create key.pem & cert.pem like so:
> openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes
It will ask for information about the certificate - Insert whatever you want.
-
For catching the shell you need to start a listener, which supports encrypted traffic.
I recommend openssl itself or ncat - Example syntax for both:openssl s_server -quiet -key key.pem -cert cert.pem -port [Port Number]
ncat --listen -p [Port Number] --ssl --ssl-cert cert.pem --ssl-key key.pem -
Plug in Bunny, it will create a web server, and uses Invoke-Expression to execute the shell.
Disclaimer: Because of obfuscation, it may take some time until the shell is fully executed by powershell

