Skip to content

Conversation

@AlexanderWyt
Copy link

Hi I made this so you can get a computers password this only works on Windows.
And I just want to say have a great day.

I created a payload that gets the windows password hash
created a README
@hak5peaks hak5peaks added the Hold label Oct 27, 2025
@hak5peaks
Copy link
Member

Placing this PR on hold as I am currently away from my hardware and am unable to test. I will follow up with a review soon :)

Then it says yes to run as admin.
Then it writes down the users. (just in case you dont know what the username is (Ik its irelevant))
Then it writes down the IPs. (so you know what to connect to)
Then it writes down the hashes with SAM and SYSTEM.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This payload seems more fitting inside of the exfiltration category due to its nature. Please move it into that category directory.

QUACK DELAY 2200
QUACK ALT Y
QUACK DELAY 1000
QUACK STRING "ipconfig /all | Out-File -FilePath 'D:\nothingwashereorwillhappen\IP.txt'"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not everyone's BashBunny will mount as D:/ drive. A better approach to this is use the BashBunny drive label.

DRIVE_LABEL="BashBunny"
QUICK STRING '$Drive = (Get-WmiObject Win32_Volume | Where-Object { $_.Label -eq "'$DRIVE_LABEL'" }).DriveLetter + "\"; $Drive'

This will have powershell use the BashBunny Label to locate the drive letter of the bash bunny and export it as a powershell variable you can then later use for saving files to the BashBunny.

Just as a example:

QUACK STRING 'whoami /all | Out-File -FilePath "$($DRIVE)\loot\waitwhoamI.txt"'` 

Please make this change across your payload and be mindful for syntax overlaps.

Then it writes down the users. (just in case you dont know what the username is (Ik its irelevant))
Then it writes down the IPs. (so you know what to connect to)
Then it writes down the hashes with SAM and SYSTEM.
DISCLAIMER: this is all wroten down on D:\nothingwashereorwillhappen\ so you need to have a folder with that name on your bash bunny.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add a note instructing the end user to make a directory on the BashBunny root directory named nothingwashereorwillhappen as this is critical to the payload running. I would recommend renaming this directory to just be loot to simplify thing as I did in my code example.

@AlexanderWyt
Copy link
Author

AlexanderWyt commented Dec 25, 2025 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants