Jump to content

fuzzerman

Members
  • Content Count

    2
  • Joined

  • Last visited

About fuzzerman

  • Rank
    Newbie

Recent Profile Visitors

618 profile views
  1. is going to bbq a mac motherboard. http://t.co/K54LCvv

  2. Yes, as RUdude says, the victim must have admin privileges. Thanks for pointing that out, I have updated the original post.
  3. I know that if you have physical access to a computer, it's pretty much owned. But the reason I wanted to make a rubber ducky payload of this old backdoor is that you only need a few seconds to install the backdoor. I.e when the victim leaves his/hers computer unattended without putting on screen saver with password, you put in the rubber ducky and install this payload. After this you can a) press the SHIFT key continuously for 5 times or B) Alt+Shift+PrintScreen which will open a command prompt with system privilege. Simple and cool :-) Make sure to take a backup of the original sethc.exe.
  4. The trainer is Joshua "Jabra" Abraham the maker of Fierce (is a network enumeration tool) http://t.co/VMS5F2x

×
×
  • Create New...