Jump to content

h4x0r666

Active Members
  • Posts

    27
  • Joined

  • Last visited

Everything posted by h4x0r666

  1. How comes, that it has to be so low? Anyway thanks for merging it! So 2 KB per payload ? And.. so you put it in, and it will automaticly start the first inject.bin like the default firmware(i have) does.. and then when you want the other one you press capslock? or will it only start after you pressed something(any inject.bin)? How many lines could a payload contain of 2 KB o.0?
  2. Hello everybody! I wonder.. is there any payload that simply executes something that would work on any OS? (executing a file from the SD, so that program could do the rest since i just read somewhere that there is a max of 4 KB for the inject.bin to be.. not very much) I also wonder if it is possible to bruteforce an logon screen from any windows computer, like bruteforcing an android key which i have seen on the hak5 series.
  3. the fuck? does the usb rubber ducky has a limit? why is that.. 4 KB is not very much.. ...
  4. yeah i see, it disables the auto run and makes it possible to run the payload through those triggers.. so i should get the newest twinduck and wait for a twinduck which also contains the multi payloads? :P mkay (i hope the new encoder works since the last one with the repeat function didnt..)
  5. i posted a large payload somewhere with different possibilities on how to hide it.. were only one worked for me xD i don't remember it though.. but i guess i did it by entering the move command promt option and then just very fast insert some down keys to hide it beneath your screen while it does the rest.
  6. Oh so am i right? The; c_duck_v2.1.hex (Twin Duck - Reloaded; Composite V2.1) is an HID and an Mass Storage.. So you can execute things from the SD with the inject.bin? USB_v2.1.hex (FAT Duck; Mass Storage Version 2.1) Makes from the USB Ducky, an SDcard reader alone since it reads the SDcard just like an reader and nothing else. c_ducky_v2_S002 & S001 (Composite Duck - Special Request 00*) No idea what the special request is but probably not better then the twinduck. m_duck_v2.hex (Detour Duck Version 2 (Multi Payload) (formerly Naked Duck)) is an HID with Multiple Payload possibilities. c_duck_v2.hex (Twin Duck - Reloaded) Lower version from the Twin Duck... USB_v2.hex (FAT Duck; Mass Storage Version 2) Lower version of from the useless? Lets say.. standalone, SDcard reader with no extra posibilities? duck_v2.hex (Duck Firmware Version 2) The default firmware i have now? I guess.. And you were saying, you also would like to have the twinduck + multipayload in one, which is like i said and also wanted the HID, Mass Storage and Multi Payloads.. I can't wait :D But prefer the twinduck over the multi payloads if it is not going to happen^^
  7. Is it possible to combine every firmware into one? Well just the HID, Mass Storage & Multiple Payloads? What would even happen if the inject.bin presses one of the three multi payload buttons? XD And if this is not possible.. I have to use USB_V2.1.hex right? Would be epic to have everything into one, i wonder if the Mass Storage just shows the content of the SD like it would do when you have it in your SDcard reader. Would seem a little bit suspicious ( a regular USB Stick that has a file on it, called inject.bin, lol) :P Every firmware has the HID in it already right? Probably yes^^
  8. Which firmware is available? Which firmware is the best/do you recommend me? What are the differences between each available firmware. i'd like to know that before i change my firmware to the mass storage + hid one (does that even mean that i can change the payload while the SDcard is in the ducky, in my computer?) lol. I really have the feeling i will do something wrong. (I have the same feeling when i have to flash roms to my android but whatever) I appreciate all the information that you guys give me!
  9. i got the latest (green) board, i hope i don't fuck my ducky up xD would be awesome if someone could help tomorrow through teamviewer or something.. (for less chance of failing) >.<"
  10. The encoding process in 2.3 is done in less then a second while in 2.4 it or takes very very long.. or it just doesn't work but i quitted after waiting a couple minutes is it working for you correctly just like in 2.3 ? (I have Windows Home Basic, if the OS is the problem which wasnt on 2.3) and i have no idea what firmware i have at the moment.. since i just got my ducky i guess the default firmware it should have? What is the difference in TwinDuck Firmware? what do you recommend me.. ^_^
  11. Hmm okay, i just wanne be ready for when the victim doesn't have internet access at that moment because if you just let it (copy &) execute from the sd.. but the given payload for that isnt working for me because somehow it doesnt see the SDcard but it can activate the inject.bin.. do you got any explanation and possible fix?
  12. Nice haha but anyway i got the DOWN thing working.. by replacing: ALT SPACE STRING m DOWNARROW REPEAT 100 ENTER With: ALT SPACE DOWNARROW ENTER DOWNARROW DOWNARROW DOWNARROW DOWNARROW DOWNARROW ENTER (But then 100 times the DOWNARROW because i guess... .. the repeat function isnt even working?) But do i need something extra to be able to run files from the SDcard while being mounted by the ducky? o.0 please explain :D
  13. Nice song haha :P But anyway, i want it to start a program from the SDcard.. how? When i tried the Payload runexe from sd, it doesn't "ever" see it? Do i need something extra to make it work or..
  14. did the hackers deface it or something? and if you guys don't got backups.. why not?
  15. Well i love perl, but its not a 'must'. and the decoder does work a little bit though :P
  16. I don't think it does the down key at all look at this screenshot i just made.. (just before it quitted) And yes ApacheTech Consultancy, i'm interested if you could show us some example payload with your nice file :D and.. for /f %d in ('wmic volume get driveletter^, label ^| findstr "H4X0R666"') do set myd=%d i just waited and tried it some more while the ducky did his thing (screenshot..) but it can't find the sdcard.. i wonder how it executes the inject.bin if the sd directory isnt detected o.0 well its my first day of using my ducky but anyway.. feels bad that it failed
  17. Oh gosh, is this the reason why usbrubberducky.com and avocado.hak5.org is offline? https://twitter.com/ThomsonIT/status/292958918190178304 Any offline versions of the avocado somewhere to download? I liked how it looked like xD
  18. Np encoding goes smoothly and the ALT F4 is to close the extra windows from iepv.exe, operapassview.exe, mailpv.exe .. etc and yes i have looked over that script but how long does it needs to take to see my sdcard? it sees my ducky directly.. so since he also executes the inject.bin (from the sdcard) why doesn't he see the sdcard with the command? and why isnt the (hide window) working? i used the snippets from the official payloads... ..
  19. is it also possible for the newer duckys? because normally i use ophcrack cd's and such.. but i just got my rubber ducky.. so that would even be better to just put it in and it immediatly starts bruteforcing!
  20. would love to have an tutorial on how to make this from my usb rubber ducky ... much more effective!
  21. I edited the whole payload again.. i am trying all kinds of stuff but it just doesn't do what i want it to do, please someone help me^^ I used the encoder 2.3 so yes it made the inject.bin succesfully but there must be something with the script.. STRING for /f %d in ('wmic volume get driveletter^, label ^| findstr "H4X0R666"') do set myd=%d That above line only works when i have the sdcard in my reader but not in the ducky (and yes its called h4x0r666) but that can't be the problem. and is there something with the repeat 100 because its not going down.. someone please try and test it and if possible give me the inject.bin & modified payload. Manually almost everything does as i want.. but the ducky doesnt^^
  22. Or its the perl script or its the inject.bin but i don't get the exact output as the input. And is there a inject.bin perl encoder instead of decoder?
  23. Yeah i ment CONTROL ESCAPE instead of CTRL+SHIFT+ESC.. but the the http://www.iducke.com/Encoder/ gives the following error.. CTRL-SHIFT ENTER is an unrecognized command EDIT: This works though.. But i need it to start as admin and thats not the case with that code because when i start cmd through CONTROL ESCAPE > CMD > CTRL-SHIFT ENTER (manually) it can start any program directly as admin without asking again but with the above code it may look like it started as admin but its not because if you try to start a program it will still ask to accept or cancel..
  24. I need it to start cmd as administrator.. and i have a question also^^ What happens if an AV detects a malicious file? because the last program somehow got a false warning detected but i ignored it with my AV so i don't know what would happen if everything worked but it still got detected? I am not going to crypt it :P to much work^^ But i can't make the inject.bin if i use CTRL-SHIFT ESC :( it gives me an error so i have to find another way to open cmd as admin.. (changed first line because it doesn't need to start with GUI r but just with GUI i guess? (the start menu..) same as CTRL-SHIFT ESC? please someone help fixing it..
  25. What is wrong with this? I just got my rubber ducky but its not doing what i want.. it just opens some random things and type the rest of the code there.. i made the inject.bin with http://www.iducke.com/Encoder/ because i have no linux beside me at the moment-.-" this is the payload: EDITED AGAIN..... Please see my last post^^
×
×
  • Create New...