Finally got a minute to try this out but before i do i have to ask does this require admin privileges on the target machine or will a new guest account outside of admin group be fine for a quick test?
@I am Jakoby hahaha appreciate it!! This is an old video that i only now uploaded. So unfortunately your discord function didn’t exist yet😭. So i will def make an updated version!!💚
@@CosmodiumCS Hi can you make one that records keystrokes onto a text tile in a secret location in the computer? What happen if computer is not connected to internet? All your previous keyloggers won't work if there is no internet.
I don't have a Rubber Ducky but I do have an Arduino micro pro. The way I'm thinking of doing it is I plug in a USB with the files and then the Arduino micro with the payload. So my question is, can 'L' be any storage device? So in this case, can it be my other USB?
yea totally, but you are probably better off modifying the payload to download the files off the internet and execute them onto the system, rather than loading them from a device. it'd make your execution flow quicker
I'm using Raspberry pi pico instead of Rubber ducky because I can not find Ducky in my country, so I wanted to know what does exactly TwinDuck does on the Ducky ? Do I need to follow that step ?
Hey, great videos but I wanted to ask if this still works? I just tried it a couple times but it doesn't seem to work for me? When it executes PowerShell the commands just give errors before it closes down and nothing happens?
@@CosmodiumCS do you have a tutorial or can recommend anyone who has a payload for a working keylogger? Even if it saves it to the USB. I'm still new in ethical hacking.
yes exactly, this was meant to be a PoC to showcase what is possible. to avoid it from being detected, try working on different obfuscation methods or AV evasion. maybe something other than powershell
Would you be able to edit the payload so that on the newest rubber ducky the v3 with ducky script 3.0 just set the attack mode to hid and storage mode and then once it is done moving files it would switch back to hid mode instead of twin duck firmware?
I just tested this myself, just put "ATTACKMODE HID STORAGE" at the top of the payload and then at the end if you want it to go back into HID mode, just put a line after the payload that says "ATTACKMODE HID" and its right back to HID mode
Great Cosmo good video. We the novice appreciate your effort making quality content. I wonder if any way we can copy files or password back to the rubber ducky , once it is flash to the twin firmware,? like copy the wifi password for example without using webhook or any server, thanks
Hey thanks!! Yes, using twinduck or the new usb rubberducky with built in storage access, you can have the creds be saved straight to the ducky's storage 🔥
@luismarrero9293 yeah i covered it a little while ago 👍, you can check out this video: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-ao32BS8fwaM.html
hey so i was finally able to try it with my new arduino, i changed the script so the files would get downloaded from the internet and it works. Altough the logged keys do not get sent to the discord webhook. Ill try to check out what goes wrong and ill let you know
Dude…this is easily one of the best comments i have ever received!! Not only did u take the initiative to figure out the problem urself (instead of asking me the obvious), you are also tackling the new error at hand. If you need any help you are more than welcome to reach out to me on discord