Тёмный

Staged and non-staged payloads for the USB Rubber Ducky [PAYLOAD] 

Hak5
Подписаться 941 тыс.
Просмотров 25 тыс.
50% 1

In this episode, Darren Kitchen digs into the cApS-Troll payload for the USB Rubber Ducky by Atomiczsec to discuss the workings and best practices of staged and non-staged payloads.
cApS-Troll by Atomiczsec: hak5.org/blogs...
PayloadStudio: payloadstudio....
Discover Payloads: payloads.hak5.org
Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → www.hak5.org
Shop → shop.hak5.org
Discord → / discord
Subscribe → www.youtube.co...
Support → / threatwire
Contact Us → / hak5
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.

Опубликовано:

 

4 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 33   
@rationalbushcraft
@rationalbushcraft Год назад
Great to see you back Darren. I always enjoy your enthusiasm.
@azoicxx
@azoicxx Год назад
Very cool payload to troll friends, but then how do you remove it?
@CliffordMiller-fu7nu
@CliffordMiller-fu7nu Год назад
Finally! Darren is back! What happened to van life?????
@prithvirajghorpade5538
@prithvirajghorpade5538 Год назад
Thank you sir thanks a lot for your great contribution to the free education content of cyber security I am here with you and gonna watch all your upcoming and recent videos.
@Rob_Turner_UK
@Rob_Turner_UK Год назад
Glad to see Darren back, will be a regular viewer again
@69nunyabidness
@69nunyabidness Год назад
This would be a great troll on someone trying to type a password. I know, all of you use Keypass or something similar to aggregate your passwords, but I'm kinda old school.
@christopheradrift5058
@christopheradrift5058 Год назад
Now what would it take so when the caps lock being pressed it will drop a L
@AdnanKhan-sc6hh
@AdnanKhan-sc6hh Год назад
Hay Darran, nice to see you back.. I have Question how would one stop this script?
@TheCyb3rPenguin
@TheCyb3rPenguin 11 месяцев назад
idk
@ElbowNi1
@ElbowNi1 Год назад
All well and good till someone looses an eye! So how does the victim stop it from blinking, is the hidden PS running somewhere visible?
@georgecole9190
@georgecole9190 6 месяцев назад
How do you stop the payload from continuing tho? how would we stop the caps lock from happening? is there a timer of how long the payload runs before it shuts down or somert?
@Braddeman
@Braddeman Год назад
Not to mention only allowing signed powershell script so it might not run anyway. Might not be able to use a script and use keystroke injections instead is preferred for that reason.
@geroffmilan3328
@geroffmilan3328 Год назад
So many ways round script signing & execution policy, yet I see almost as many determined fools on reddit who are certain they're useful defences 😁
@Braddeman
@Braddeman Год назад
@@geroffmilan3328 yes you are right but it is called defense in depth. It is one part of the many process that should be implemented and as this current payload stands it will not get around the powershell execution policy. EDR is more than likely going to pick up your techniques anyway. They have gotten pretty good at that.
@Counterhackingsafe
@Counterhackingsafe Год назад
I really like the video, very insightful
@geroffmilan3328
@geroffmilan3328 Год назад
I'm not sure why this script persistently creates a New-Object every 2 lines - the one it made first time around hasn't gone anywhere if this is all 1 script or session?
@1V401K
@1V401K 17 дней назад
Damn, this tool can be useful for on a statement of work and Quality Assurance PenTest Report.
@bestelevated
@bestelevated 8 месяцев назад
Any telemetry?
@deucekiller022
@deucekiller022 Год назад
Why was he missing from all the other videos
@王利波-i5j
@王利波-i5j Год назад
What's the name of your book
@squiddymute
@squiddymute Год назад
do these work with an older version of rubber ducky ? i bought mine back in 2016
@PigOnPCIn4K
@PigOnPCIn4K 2 месяца назад
Did you ever find out?
@bnk28zfp
@bnk28zfp Год назад
darren is come back 😮 wow great to see you back!!!!
@itzusmanidrees5916
@itzusmanidrees5916 Год назад
It bypass windows 10 / 11 defender
@FutureWarCultist
@FutureWarCultist Год назад
His heart is still kickin! 🎉
@brand_hacker
@brand_hacker Год назад
1st
@m.m.m.c.a.k.e
@m.m.m.c.a.k.e Год назад
Lolz
@UNcommonSenseAUS
@UNcommonSenseAUS Год назад
Bwahaha he believes things go to "space" 🤣🤣
@minchy83
@minchy83 Год назад
Well he said Atlas V but showed a picture of a Falcon 9 so we really can’t trust his space expertise 😉.
@geroffmilan3328
@geroffmilan3328 Год назад
And what, you believe NASA & the Chinese are *co-operating* to hide the flat earth from us all? How's JFK Junior doing, & ya wanna buy this bridge off me? Need a quick sale
@WiseguyKevIn2
@WiseguyKevIn2 Год назад
This will be so fun lol 😂
Далее
HTB #2 - Grandpa & Fails
1:55:01
Просмотров 16
How To Scrape Any Website Using Hidden APIs
25:11
Просмотров 2,8 тыс.
ЭТО НАСТОЯЩАЯ МАГИЯ😬😬😬
00:19
Do NOT Plug This USB In! - Hak5 Rubber Ducky
11:37
DIY Wifi Pineapple HAK5 for 10$
19:19
Просмотров 991
17 Hacker Tools in 7 Minutes - ALL Hak5 Gear
6:54
Просмотров 430 тыс.