[Payload] Android Brute Force 4-digit pin in Classic USB Rubber Ducky Posted January 16, 2018 To summarize new users. The code provided are designed to be executed within a Linux shell. It will then output a file named android_brute-force_0000-9999.txt From there, take that and encode it on ducktoolkit.com. There is one line for every pin combination, why it's 600k. I don't know if this payload still works, I'm going to try it on an s8+ with a USB -> USB-C converter and post the results.
[Payload] Android Brute Force 4-digit pin
in Classic USB Rubber Ducky
Posted
To summarize new users. The code provided are designed to be executed within a Linux shell. It will then output a file named
From there, take that and encode it on ducktoolkit.com. There is one line for every pin combination, why it's 600k.
I don't know if this payload still works, I'm going to try it on an s8+ with a USB -> USB-C converter and post the results.