Payloads
Learn all about payloads within Wagyu.
Last updated
Learn all about payloads within Wagyu.
Last updated
In the Wagyu client there are numerous payloads available during an engagement, some of which have been created by us, others can be created by the user. Payloads can be viewed from two pages within the Wagyu client; The payloads table and the payloads editor:
Each payload is categorised by a type. The following types are currently available within Wagyu:
Recon
Lateral Movement
Data Exfiltration
Exploit
Persistence
Misc.
Each payload is given a risk between 1 and 5 which signifies how likely the victim is to notice the payload executing. For example, an alert box may be a 5 (very likely to notice) and something which runs in the background may be a 1 (unlikely to notice).
Other payloads such as out exfil-clipboard are given a medium risk score as a permission prompt will appear for the victim.
The table below outlines the default payloads currently available in Wagyu. The default payloads are seeded on first launch using the mongo-seed/initPayloads.json
file:
basic-alert
Show a basic alert in the victims browser
Misc.
crash-tab
Crash the victims browser tab
Misc.
rickroll
Rickroll the victim
Misc.
exfil-cookies
Exfiltrate the victims cookies from the current tab
Data Exfiltration
exfil-clipboard
Exfiltrate the victims clipboard
Data Exfiltration
popunder-window
Open a duplicate popunder window of the current tab
Persistence
webcam-snap
Take a snapshot of the victims webcam
Data Exfiltration