Hi fellow ducky lovers. I have a question which is probably pretty simple but i cant seem to figure it. I have a particular scenario which im trying to exploit which requires the dual duck firmware to effectively do two things: - execute some powershell scripts to copy a few binaries to the users temp directory - copy some files back off the users machine to the SD card, remove any remnants from the host However, the organisation Im testing uses device locking and only one particular USB mass storage device is permitted with write access, all others RO. Therefore, I created a vidpid.bin with the HEX values needed to impersonate the device. So the device i want to emulate is the following: 0951 Kingston Technology, 160d DataTraveler Vault Privacy No matter what i do, the device is recognised as the ducky no matter what. I have tried the c_duck_v2.1 and duck_v2.1 firmwares, as well as USB_v2.1 - all with the vidpid in the root of the SD card, but to no avail. What am i missing here? In what configuration can the VID/HID be amended to emulate another device? Any pointers very much appreciated.