🥩
Wagyu Documentation
  • Wagyu
  • Installation
    • Wagyu Server
    • Wagyu Client
    • Connecting
  • Users
    • Creating Users
    • Modifying Existing Users
    • Delete Existing Users
    • Changing User Passwords
  • Implants
    • Creating Implants
    • Deleting Existing Implants
  • Payloads
    • Payload Functions
    • Creating Payloads
    • Initial Payloads
    • Modifying Existing Payloads
    • Deleting Existing Payloads
  • Hosts
    • Compromising Hosts
    • Executing Payloads
  • Findings
Powered by GitBook
On this page
  • Payload Types
  • Payload Risk
  • Default Payloads

Payloads

Learn all about payloads within Wagyu.

PreviousDeleting Existing ImplantsNextPayload Functions

Last updated 2 years ago

In the Wagyu client there are numerous payloads available during an engagement, some of which have been created by us, others can be created by the user. Payloads can be viewed from two pages within the Wagyu client; The payloads table and the payloads editor:

Payload Types

Each payload is categorised by a type. The following types are currently available within Wagyu:

  • Recon

  • Lateral Movement

  • Data Exfiltration

  • Exploit

  • Persistence

  • Misc.

Payload Risk

Each payload is given a risk between 1 and 5 which signifies how likely the victim is to notice the payload executing. For example, an alert box may be a 5 (very likely to notice) and something which runs in the background may be a 1 (unlikely to notice).

Other payloads such as out exfil-clipboard are given a medium risk score as a permission prompt will appear for the victim.

Default Payloads

The table below outlines the default payloads currently available in Wagyu. The default payloads are seeded on first launch using the mongo-seed/initPayloads.json file:

Name
Description
Type
Risk

basic-alert

Show a basic alert in the victims browser

Misc.

5

crash-tab

Crash the victims browser tab

Misc.

5

rickroll

Rickroll the victim

Misc.

5

exfil-cookies

Exfiltrate the victims cookies from the current tab

Data Exfiltration

1

exfil-clipboard

Exfiltrate the victims clipboard

Data Exfiltration

4

popunder-window

Open a duplicate popunder window of the current tab

Persistence

3

webcam-snap

Take a snapshot of the victims webcam

Data Exfiltration

4

Payloads Table
Payload Editor