Skip to content

Instantly share code, notes, and snippets.

@miketweaver
miketweaver / install-nightshade.md
Created July 7, 2017 00:42
NightShade Install Instructions

Install NightShade

Get NightShade Files

git clone https://github.com/UnrealAkama/NightShade
cd NightShade

Setup Pip and Postgres

sudo apt update

GPG Practical Exercise

Create your master keys

  • Create gnupg folder

    $ mkdir -p ~/.gnupg/
    
-- Really random test code for the MAx7219.
-- Chain 7 segment display off dev board
-- Chain 8x8 matix off of 7 segment display.
-- run this code to get 87654321. Assuming the L to R digit layout is just the
-- dev boards we picked up.
-- Functions:
--
-- DISPLAY.text(str)
-- Displays the text, takes a string.

Empire with a Ducky

by bashNinja (Mike Weaver)

Goals

In this lab, you will work with a rather simple device, a RubberDucky. It acts as a Keyboard HID which will be automatically detected and accepted by most modern operating systems. This allows you to exploit the trust of a local user on a keyboard and run commands at speeds beyond 1000 words per minute bypassing traditional countermeasures. We will start by writing a simple attack on a Windows Machine, and then we will move onto more complex payloads.

Background Information

USB RubberDucky details The RubberDucky comes in two parts. The Ducky itself and a MicroSD card. The MicroSD card needs to be formatted to FAT or FAT32. The Ducky reads a file from /inject.bin which is an encoded version of our payload.

@miketweaver
miketweaver / passgen.pl
Created May 27, 2016 18:25
/dev/urandom Perl password Generator
#!/usr/bin/perl;
my $Matchlist = "abcdefghijklmnopqrstuvwxyz0123456789";
my $Length = 14;
my $RandomDevice = "/dev/urandom";
my $password = "";
open RANDOMDEVICE, $RandomDevice
or die "Can't open random device $RandomDevice: $!\n";