makozort / RDwindowspasswordgrabber

a PEN testing script for the rubber ducky that grabs the users login passwords, they will need to be decrypted using NTML method
22 stars 32 forks source link

error messages when running #2

Open darkhoodie opened 1 year ago

darkhoodie commented 1 year ago

Hello makozort

Hoping you can help. Have been trying this script. Am compiling it in Hak5 Payload Studio. Few things occurring. I add the URL to mimikatz.exe from github (https://github.com/ParrotSec/mimikatz/blob/master/x64/mimikatz.exe) . It tries to open more than one instance of Tor. Also, I get an error message at STRING Remove-Item (Get-PSreadlineOption).HistorySavePath. I think it's because powershell never actually opens? Also, I noticed that we are downloading mimikatz but I see no instruction regarding the actual installation of mimikatz or subsequent uninstallation. I'm new to ducky script so I hope you can help.

Thank you

darkhoodie commented 1 year ago

Here is an example of an error message: (Get-PSreadlineOption).HistorySavePath Windows cannot find '(Get-PSreadlineOption).HistorySavePath'. Make sure you typed the name correctly, and then try again.