Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

Everything posted by uintdev

  1. Information is scarce regarding the "trust asset version," but from what I can tell, it is to do with a version of a component that is part of Apple's trust store. It is not a certificate. https://discussions.apple.com/thread/250858614 http://fluco.org/tech/downloads/SSL certificate installation instructions for IOS.pdf
  2. To make this barebones as possible, here is a working example but in cURL (note: this is a POST request -- it checks if the CSRF cookie value matches up with what is POSTed): curl 'https://samperson.itch.io/desktop-goose/file/1957163' -H 'Cookie: itchio_token=a' --data-raw 'csrf_token=a' If successful, this would return a JSON response. This includes the key named 'url' and 'external'. The 'url' key will have a value containing the 'generated' valid URL to the download (it does expire). You would then use that URL to download the archive. Do note that as itch does use Cloudflare, it is possible for the request to be blocked due to missing headers such as the user agent. This is only one piece of the puzzle. As this is a USB Rubber Ducky, a script that does all of that either has to be typed out or you'll have to use the 'twin duck' firmware (for simultaneous [slow] mass storage) and create the software / script so that the payload is way more sped up (by directly executing it [on the USB Rubber Ducky] rather than typing it out).
  3. Bruteforcing hasn't really been effective since many major Android versions ago (bad attempts eventually adds on to the lock-out time). These days, user data on Android devices is encrypted with either full-disk or file-based encryption. When booting up and reaching the lock screen, you need to enter the pin or password to decrypt that data with the information you provided (hence why biometrics cannot be used at that stage). This means, unless you can figure out the correct code.. well.. just hope that Google helped out with backups.
  4. From my experience, not even formatting it to ext4 worked. As others had suggested, going in via SSH and using the 'reformat_usb' command did the trick. Although that resulted in me having to copy the upgrade file over as root to the flash drive on a standalone PC using a GNU/Linux distro (Virtualbox was being a little buggy with mounting the drive to begin with). Or just use the manual upgrade method for the WiFi Pineapple as suggested above. Less effort.
  5. Not certain about the requirements, but last I heard, it was recommended to use a really low capacity micro SD card with the USB Rubber Ducky.
  6. Update on this. rt3070 rt5370 rt28xx (Needs firmware v1.1.)
  7. With a firmware update, it's technically possible. Although there might be limitations (i.e. storage being too small to install the appropriate kernel module(s)). Even if it was 100% possible to add such support without issues, would those who are developing for the Packet Bunny find it to be worth adding in for this specific product when it's mainly for USB mass storage?
  8. Have you tried putting the commands in quotes? For example: Q STRING "foobar"
  9. Having the string encoded with base64 would add on more characters to type out (including the base64 decode function). If I were to encode the PowerShell part (without the variables becoming an IP and a port number): it would be 458 characters long base64 decoded but 611 if base64 encoded (this includes escaping so it could be slightly shorter). This is without the function required to decode base64. I figured having it harder to read in a small window would be somewhat good enough (won't be in full view, goes by fast, Windows may lock up cursor during keyboard input). It's not like we're passing over a small binary file via netcat, so my question is if it would be worth adding in the extra steps.
  10. Minimum on mine was 15. Perhaps it's to do with the display configuration. The changes have been made in v0.1.3. I have to say, this one really gives it a boost. Thanks.
  11. v0.1.2 is out. 'cmd' is now directly ran by default (avoiding that very noticeable window with a deep blue coloured background).
  12. It should allow commands that would be admin-only sent from the BB to work. Pushed out v0.1.1. It uses the shortcut @Dave-ee Jones suggested for the UAC, ADMIN is now false by default, CMD background processes created as a result of the payload now close once done and delays have been shortened. If the newly set delays are too short, let me know and I'll try adjusting it to something reasonable. If you've used the previous version of the payload on a computer, check task manager and kill "Windows Command Processor" processes that were created by the payload if you want. They use up a little RAM.
  13. It would need to remain connected. The LED will indicate once it's done. Indeed it sucks for there to be such character limit. I did manage to decrease $sm to 254 characters (without IP and port) but that is definitely not enough still. I could use SimpleHTTPServer to host the PowerShell file on the Bash Bunny. As for being to be able to execute it as a privileged user (optionally), that could be a bit of a challenge. EDIT: Hello. Future me here. Dismiss that comment about using a HTTP server. Can't put the variables in the script that way. Ah, yes. I heard of that shortcut but kinda forgot about it being a thing. Would speed it up a bit, so thanks for that suggestion. The ADMIN variable changes the method it would run the CMD. So if it were to be set to false, it won't go through the UAC at all.
  14. Discussion thread for the RevShellBack payload. I've seen quite a few Rubber Ducky projects to do with getting a reverse shell running on a PC so that the shell can be accessed remotely on a different computer. But what got me thinking is this: the Bash Bunny is a full-on Linux ARM computer, right? It has netcat and it can do HID and ethernet simultaneously. So.. why not use that instead? At first, this payload will use a bit of HID trickery to hide itself from an observer as best as it can. As soon as it has done executing the final PowerShell command, HID is no longer used. User-defined commands will be sent to the computer in the background. By default, 4 commands are executed as a demo: Write file (with content) to the desktop Eject CD/DVD tray (if it exists) -- thank PowerShell for making that possible Open calculator application Message box -- powered by PowerShell For information about the payload, the payload script itself and how to configure it, it can be found at this GitHub repository: https://github.com/uintdev/RevShellBack
  • Create New...