Captures the client network session. Captures the client side session keys. Partially avoids "PowerShell Script Block Logging". Closing of all windows. Hide "PowerShell" window. Check if current process have "Administrator" privilege. Sets the "SSLKEYLOGFILE" environment variable to store SSL session key information. Starts a "Network Tracing Session" with "ETW (Event Tracing for Windows)". Writes the file system cache to disk. Safely eject.
Credential harvesting is the method of obtaining credentials — think usernames and passwords. Many techniques are used to obtain credentials, from keylogging to credential dumping. With a set of credentials in hand, red teamers may access systems and make lateral movement across the network, as well as creating their own credentials which may be difficult to detect in a breach. See all credential payloads.
This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.