USB
File Exfiltration
Uses a slightly modified form of Hak5's keystroke reflection to exfiltrate data via Caps Lock, Scroll Lock, and Num Lock. A bit slow, but it works nonetheless.
Uses powershell to run the exfiltration command. Make sure Win+R and powershell is accessible on the target system before running.
This uses SDR data transfer instead of DDR - this will be changed in a later update, which should speed up the transfer process by ~100%
Ducky Payloads
Shows all DuckyScript payloads saved in ./payloads
Runs the payload when chosen.
LOLBAS
Shows all LOLBAS payloads saved in ./core/LOLBAS.
Some payloads use environment variables, while some do not. None of them will tell you that, though, so it's not recommended to use this yet. Here's the list of the environment variables that the scripts use:
The descrpitions of the environment variables are infact, non-descriptive. My fault
DS_FILE
is used for a target file on the hostDS_IP
is used for target IP addressDS_PORT
is used for target port of a commandDS_WEBDAV
is used for a web drive, ex: FTP drive for exfilling filesDS_EXECUTABLE
is used for a target executable, to run on the hostDS_REVERSE_SHELL
is used for a reverse shell on another host: example of this value is 10.10.10.10:8466DS_INPUT
is usually used for input files, like a prompt or etc.DS_OUTPUT
is usually used for output files, like logsDS_SOURCE
is used for a source url, to download payloads or etc.DS_DIRECTORY
is used for the directory of a fileDS_HEXFILE
is rarely used but is used forcertutil-hex.txt
and more to comeDS_FAKEFILE
is used foralt. data streams
incmd
, and is used for running a file as a batch file
Toggle USB Ethernet
Turns on and off the RNDIS ethernet adapter gadget. On boot, it is enabled.
Toggle Mass Storage
Enable and disable the USB mass storage gadget. On boot, it is enabled. This also mounts it on Pwnhyve's linux system, so you can access files through SSH.
Hide USB device
Hides the entire USB gadget, and make the device look unplugged to the host system.
Drive Stealer
This requires a USB to microUSB adapter connected to the Pi.
When a USB drive is plugged in, this plugin will automatically scour the USB drive for valuable files - by default it's only document files, but it's editable in the main configuration of Pwnhyve.
By default, these file types are exfiltrated:
All found files are copied to /tmp/pwnhyveExtractedUsb
.
Last updated