Jump to content

Usb Lethal Injection?


teknicalissue

Recommended Posts

hello, im new to this forum but it looks really kick @$$ :smile:

EDIT: this may seem skidish but hey?, a contribution is a contribution right?

now while watching you vids i was actually thinking. .  what if i want to take passwords from the target computer AND "Disable" it to its knees where the only way to bring it back is to reformat.  now how is this done? well i used fgdump for the passwords (if anyone can provide a link for IE passwords and stuff like that i would HIGHY appreciate it) and once that has been opened, it proceeds to open up the "Injection" what the injection does relies on two things.

is the user running enough privlages to edit protected system files?

if yes then edit the system32 files AND the sytem32 back up files, also edit the

files that allows the system to be accessed through safe mode.

if the user is not running with enough privlages then place a specific file

into the all users start up (ONLY IN XP)

and launch a message saying ("The system has been infiltrated, please log in as an administrator and edit security settings")<---- or something along those lines.

maybe a basic fork attack to convince the IT in the target work place to log in as an administrator.

once the IT logs in as administrator, the whole system files editing comes in to place, thus bringing down the system to its knees AND you have a few password hashes as your reward.  :grin:

i hope this helps =) btw I love this forum/Hack. 5 haha its pretty awsome

Link to comment
Share on other sites

actually ive already made it lol, im just posting it so people would know =) a white hat use? im not gonna lie i don't really see a white hat use... and yes natural, i agree lol i would hate this to be unleashed on me (even though i unleashed it on myself by accident 2 times lol) but yea those are my 2 cents

Link to comment
Share on other sites

hahaha thats basicly how it went, first incident was when i first finished the first batch.. lol haha i was like "lets try it =)" lol so i unleashed it on me and the second time was when i had the flash drive ready haha i accidently pluged it in thinking it had my essay and guess what? haha my comp's O/S was done and gone lol

Link to comment
Share on other sites

White Hat use: Switchblade payload that echo "Your system has been compromised. No data was stolen. You have not been infected. This note describes the vulnerability and possible workarounds. blah blah blah" >> "%userprofile%Start MenuStartupNotification.txt"

Back in the day while wardriving we'd look for shared printers and print out a little notice about how to enable WEP (WPA wasn't out yet).

Link to comment
Share on other sites

well a white hack use for this i would think is basicly to test your skills...then again that would go more towards the gray hat side.... i mean if you were an IT professional and i were to bring this issue upto you, wouldn't you do something about it kinda thing? lol but then again lol this falls under alll sorts of usb hacks haha i honestly don't think there really is a complete white hat use for this

Link to comment
Share on other sites

I'm running low on methods of textually suggesting that I'm thoroughly pissy with people who design things specifically to fuck with systems. At least some method of preventing the attacks or antidotes would be nice.

Link to comment
Share on other sites

I gotta say to post this kinda thing is alright, BUT I would think that a way to prevent this would be a much better way to spend time!!!

I mean if you are that pissed to do something like this to someone maybe you need a time out or something LOL,,,

("Hacking" Get in, Get out, Leave no trace!!!)

Link to comment
Share on other sites

I would say one way to stop it from happening is disable Autorun or make the program look for a little file in a certain area if it see it, it wont attack thats what i've done with one of my programs that TAKES pictures from My Pictures and My Documents and sends it by FTP to a server (works well). A third option is when it saves a file on its drive the computers name so its like i've already been here or he's in my list i wont do it honest

Link to comment
Share on other sites

haha moonlit lol im not gonna use it on some one else i honestly just like having something like that with me, lol same feeling as when you write a program and your like OMFG IT WORKSS!!!, honestly guys ha i really don't have any intensions on using it on some one, like i said lol it was just an idea i had.. NOW to prevent this sort of thing, have a batch file (or any other type of file) that saves/records and backs up your sytem files AND make it run on everyrestart on the autorun in the C: drive... lol goodness haha im sorry for posting this post, to me it looked like a sound idea =/

Link to comment
Share on other sites

I have figured out after a while how this could be used as a white hat use. Now place yourself in this predicament:

You have been hacked.. and it's valuable information about your credit shit.. not.. say you know who it is.. you can access the computer and the files.. but you don't want to be known by the person.. So, You put the injection in.. and bam.. your shit is protected.. :)

Now, this may never happen.. but to keep in mind.. that you asked for a white hat use.

Link to comment
Share on other sites

I have figured out after a while how this could be used as a white hat use. Now place yourself in this predicament:

You have been hacked.. and it's valuable information about your credit shit.. not.. say you know who it is.. you can access the computer and the files.. but you don't want to be known by the person.. So, You put the injection in.. and bam.. your shit is protected.. :)

Now, this may never happen.. but to keep in mind.. that you asked for a white hat use.

how about unplugging the ethernet cable

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...