Jump to content

FuNkYt3cHm0nK3y

Active Members
  • Posts

    11
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by FuNkYt3cHm0nK3y

  1. I have had the ducky for a couple of weeks now and I have yet to get this thing to work. First question...Should the ducky show up in /media on Kali 2.0?

    I have tried to go through the instructions here: https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Flashing-ducky#Installation

    I have tried this on a windows box and a linux box following these instructions. Are they outdated?

    Windows -

    • Insert Ducky in DFU mode.
    • Driver is installed and it sees the "Atmel USB Device - AT32UC3B"
    • Open the USB-Rubber-Ducky-Master that I downloaded from link above.
    • Instructions say "Its pretty simple, just execute: program.bat newfirmware.hex
      I find program.bat in the USB-Rubber-Ducky-master\Flash\Duck Programming folder after extracting the Duck Programming.zip
      Double click on it and dos screen flashes
    • Thats it....

    Is there supposed to be something else? I dont see a newfirmware.hex file.

    Linux - (kali distro)

    • Insert Ducky in DFU mode.
    • cd /media/
    • and nothing there but CD Rom.

    Could someone please help get me going. I have also tried youtube videos and other tutorals. Nothing has got me up and running yet.

  2. I just received my Ducky last week so bare with me if this has already been discussed or in the works.

    I know the whole point of the Ducky is to use it as the actual keyboad and have no user interaction what-so-ever. But the way I am understanding how this thing works is you have to flash it for how you want to use it then generate the payload and execute the payload from the ducky scrypt. So you will need to carry around multiple SD cards, duckys, or have to keep reflashing your Ducky for the next project. The goal of Hak5 and its community is to make things as simple as possible so....Here is what I am trying to accomplish...

    This would allow some interaction from the tech. But very minimum... and it will allow the tech to use ONE device to run many many exploits, cmds, payloads, etc. Here is what I am thinking. The tech puts the ducky into the USB. This automatically opens an elevated command prompt or PS. and you have options of which exploit to run. This would be something similar to the Simple-Ducky payload generator, but instead of generating the payloads its actually runs the payloads that you have already created.

    Has anyone been working on something like this? I would love to head it up, but again, I am new to the Ducky world and it would take me longer than someone that is very familiar with it. But I am here to help if I can.

    What would we need to get started?

    Could the USB Rubber Ducky do this?

    Thanks guys, Enjoying this site and all my new toys already!

  3. Add the config below to the end of /etc/hotplug.d/usb/40-supported-modems and the Novatel 5510L will work without having to configure it whenever you plug it in or unplug it.

    1. nano /etc/hotplug.d/usb/40-supported-modems
    2. scroll down to the bottom
    3. paste the config below
    4. Ctrl X* to close and save

    Cheers,

    Ian

    
    # Support for Verizon Novatel MiFi 5510L
    [[ $PRODUCT == "1410/b00b/228" ]] && {
      [[ $ACTION == "add" ]] && {
        ifconfig eth1 192.168.1.100 netmask 255.255.255.0 up
        route del default
        route add default gw 192.168.1.1 eth1
        iptables -t nat -A POSTROUTING -s 172.16.42.0/24 -o eth1 -j MASQUERADE
        iptables -A FORWARD -s 172.16.42.0/24 -o eth1 -j ACCEPT
        iptables -A FORWARD -d 172.16.42.0/24 -m state --state ESTABLISHED,RELATED -i eth1 -j ACCEPT
        logger Pineapple.modem:  Verizon Novatel MiFi 5510L Added
     } || {
        iptables -t nat -D POSTROUTING -s 172.16.42.0/24 -o eth1 -j MASQUERADE
        iptables -D FORWARD -s 172.16.42.0/24 -o eth1 -j ACCEPT
        iptables -D FORWARD -d 172.16.42.0/24 -m state --state ESTABLISHED,RELATED -i eth1 -j ACCEPT
        /etc/init.d/network restart
        logger Pineapple.modem:  Verizon Novatel MiFi 5510L Removed
      }
    }
    
    

    This worked perfectly. THANK YOU ! ! ! ! !

  4. My technolust is hitting me hard right now... I have so much badass equipment around me and no am itching for a badass project. I am up for anything, home security, home automation, hak tool, maxing out my wifi thought the house..... what ever you can think of. I would love to hear what kind of ideas you guys may have. Here is my equipment list:

    Surface Pro 3, Broken Scree and dented shell. MS refused to fix and sent it back. (i7, 512ssd, 8 gb ram) use dock for monitor view

    Dell 7440 Latop with dual 265gb mSATA drives,

    16 port POE Managed switch,

    2 - Raspberry PI

    3 - Panana Pro

    Wifi Pineapple

    LAN Turtle

    Rubber Ducky

    Nighthawk X6 R8000

    16tb Plex Media Server

    What in the world could I do with all of this? I need something REALLY REALLY BADASS!!

    Any Ideas?

  5. Hey guys (and gal Shannon), I have been lurking around the site for some time now and watching the youtube videos. I figure its about time for me to chip in and get on the forums. So, My first post is.......

    I have a brand new Verizon Galaxy Note 4 (32gb) that I would like to trade for some NEW hak5 equipment. I purchased the phone new and it has never been taken out of the box (until I took these pictures)....I ended up buying an iPhone 6 plus so I am sticking with it. Ideally I have my eyes set on the Pineapple Mark V Ultra Omni Kit, 16dBi Yagi antenna, and the Hak5 Field Kit. I believe all 3 of these from the store is around $400. If someone actually has all of this stuff laying around I would love to trade you. Or.. come up with something similar. I am up for some offers.

    Please PM me if you have any questions or offers. I can do a cash trade too :)

    Thanks ! !

    post-51406-0-05022000-1440143582_thumb.j

    post-51406-0-65966300-1440143587_thumb.j

×
×
  • Create New...