no42
-
Posts
925 -
Joined
-
Last visited
-
Days Won
17
Posts posted by no42
-
-
if you know what is wrong, and can correct pt.properties, we can stick a renamed pt.properties "br.properties" into the main source tree.
What keypresses do you need for:
Char not found:ISO_8859_1_E1
Char not found:ISO_8859_1_EA
Im guessing ISO_8859_1_E1 = KEY_RIGHT_BRACE, MODIFIERKEY_RIGHT_ALT ????
-
you need to copy the es.properties into the the same folder as the encoder
the command would then be:
java -jar encoder.jar -l es.properties -i input.txt
on linux you may need:
java -jar encoder.jar -l ./es.properties -i input.txt
I expect it needs some more work, but no one has filed/helped out bug fixing yet.
-
use the duck encoder v2.6, look at the XX.properties files, you probably want to copy the es.properties.
File bug reports for keys that are wrong, or fix the file and submit the patch to this forum.
-
-
This is how:
ifconfig wlan0 down ifconfig wlan0 hw ether 00:11:22:33:44:55 ifconfig wlan0 up
People can generally find you if they know what their doing.
You could connect the pineapple to a vpn, just install the packages you need.
-
Should not be a problem.
You just need to setup DMZ /VPN/ port-forwarding so you can gain remote access to the Pi.
Configure ZNC and an IRC client and off you go.
-
Hmmm, I see you idea.
Should be quite easy to introduce some small intervals at random, in the main firmware.
But............ then professional typists/coders can type real fast; wikipedia states companies expect professional typists to hit something like 8,000 KPH (keystrokes per hour).
So Im not really worried at the moment.
-
with cm_duck.hex you can choose between two key presses (NUM & CAPS Lock) two trigger different payloads (inject.bin / inject2.bin) and still have composite support (but your payload size is reduced to 2KB worth of instructions)
or use detour duck (m_duck.hex) (CAPS/NUM/Scroll Lock) for three different HID payloads inject.bin/inject2.bin/inject3.bin
-
Automatic - not at the moment .
Im not sure if theres any hint within the HID protocol?
I suppose it would be there, you would need a C-routine to fingerprint the HID responses/requests from the Host OS, then call an appropriate inject-win.bin or inject-lin.bin based on the fingerprint analysis.
Let me know how you get on.
-
hopefully, the next batch should be cheaper and more affordable...
you could build a version 1 - its just lacking ducky script and the current firmware mods.
-
You would need to sniff the button press from a USB keyboard using the developer IOUSB package from apple, to find the genuine code.
to eject from command line:
hdiutil eject <device>
Rumor has it the code could be "0x11"
Try adding "EJECT = 0x11" to keyboard.properties, and patching the ducky encoder source code.
If you want to try generating a simple inject.bin the binary file would look like the following in a hex editor (hex fiend should be in mac ports)
11 00
-
to make an older "version 1" ducky, with an additional sdcard adapter and header pins, some soldering required = yes.
for a "version 2" ducky, I am afraid your going to have to buy one from the hak shop, as its a bespoke product.
-
I thought pyinstaller was cross platform according to its change log from 1.3
Add support for cross-compilation: PyInstaller is now able to
build Windows executables when running under Linux. See documentationfor more details.Source: https://github.com/pyinstaller/pyinstaller/blob/develop/doc/CHANGES.txt
Update:
Hmmm, this appears to be dropped in later versions and they advise running under wine.
I now see your problem.
You could always try an older version of pyinstaller and see if that works, else I advise filing a ticket (bug ticket) with the pyinstaller team
-
short answer, no.
-
Actually a microprocessor, It has a small processor (tiny really), and a tiny amount of memory. There isnt a full blown OS like iOS or Android, merely a C program that gives it the instructions to perform.
If you wanted an iPod to act like a ducky, you would have to hack the firmware.
What the ducky is .... a re-programmable USB device with an sdcard for external expandable memory.
Therefore it could be a keyboard, mouse, mass storage or a combination, all limited by the processing and memory capabilities of the current hardware.
Its a hackable device, and the possibilities are out there!
-
Sounds like WPS pin technology?
-
-
try the following, do you get the same result?
java -jar encoder.jar -l resources\uk.properties -i ducktst.txt -o <ducky drive>\inject.bin
-
Have your followed this guide?
http://www.techtalkz.com/blog/tips-n-tricks/how-to-use-ssh-putty-behind-a-proxy-firewall.html
-
delays in your ducky script
-
hmm, hard to say?
should be working as the default language map is US. I can only guess its down to timings.
-
Just came across this blog, where a guy has written a bash script that will attempt to convert duckyscript into an Arduino ino file.
http://www.adebenham.com/2012/05/usb-rubber-ducky-scripts-on-arduinoleostick/
Looking briefly at the code, it only works for US keymap.
-
You probably want to look at (last seasons?) ssh tutorials, you can use SSH as a socks proxy and tunnel all traffic.
I think thats the easiest and simplest solution.
If your after something that will work with mobile phones (like iPhone) you really looking at an IPSEC VPN (for best security) look at
- racoon
- strongswan
- i think the pfsense firewall distro can do this? if not I know it can definitely use openvpn(ssl based vpn).
Otherwise other VPN options are using PTPP http://www.howtogeek.com/51237/setting-up-a-vpn-pptp-server-on-debian/
-
could be your timings or your language?
what script are you using? and what language is your keyboard?
[Question] Bypass Keyboard Setup Assistant (Mac)
in Classic USB Rubber Ducky
Posted
You need to update the firmware http://ducky-decode.googlecode.com to the latest duck.hex (v2.1)
then look at the "changing the Ducky's VID PID" guide hosted in the wiki (same website). There's also a handy draft Ducky guide in the downloads section.