Win_SSLKeyLog

Win_SSLKeyLog
Download Copy
Title: Win_SSLKeyLog
Author: TW-D

Captures the client network session. Captures the client side session keys. Partially avoids "PowerShell Script Block Logging". Closing of all windows. Hide "PowerShell" window. Check if current process have "Administrator" privilege. Sets the "SSLKEYLOGFILE" environment variable to store SSL session key information. Starts a "Network Tracing Session" with "ETW (Event Tracing for Windows)". Writes the file system cache to disk. Safely eject.

Credential harvesting is the method of obtaining credentials — think usernames and passwords. Many techniques are used to obtain credentials, from keylogging to credential dumping. With a set of credentials in hand, red teamers may access systems and make lateral movement across the network, as well as creating their own credentials which may be difficult to detect in a breach. See all credential payloads.

This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.

Submit your own payload, or browse more featured Bash Bunny Payloads.

 

 

Related Payloads

Silent File Exfiltrator
Silent File Exfiltrator
This DS1 payload executes a stealthy script that silently collects and exfiltrates specific file types through Discord w
Read More
Global Powershell Logging and Transcription
Global Powershell Logging and Transcription
This payload executes a script that logs all PowerShell input and output to a text file in the documents folder.
Read More
USB Poison
USB Poison
This payload executes a script that waits for new USB flash storage devices to be connected. When a new device connects,
Read More