git clone https://github.com/UnrealAkama/NightShade
cd NightShade
sudo apt update
-- Really random test code for the MAx7219. | |
-- Chain 7 segment display off dev board | |
-- Chain 8x8 matix off of 7 segment display. | |
-- run this code to get 87654321. Assuming the L to R digit layout is just the | |
-- dev boards we picked up. | |
-- Functions: | |
-- | |
-- DISPLAY.text(str) | |
-- Displays the text, takes a string. |
by bashNinja (Mike Weaver)
In this lab, you will work with a rather simple device, a RubberDucky. It acts as a Keyboard HID which will be automatically detected and accepted by most modern operating systems. This allows you to exploit the trust of a local user on a keyboard and run commands at speeds beyond 1000 words per minute bypassing traditional countermeasures. We will start by writing a simple attack on a Windows Machine, and then we will move onto more complex payloads.
The RubberDucky comes in two parts. The Ducky itself and a MicroSD card. The MicroSD card needs to be formatted to FAT or FAT32. The Ducky reads a file from /inject.bin which is an encoded version of our payload.
#!/usr/bin/perl; | |
my $Matchlist = "abcdefghijklmnopqrstuvwxyz0123456789"; | |
my $Length = 14; | |
my $RandomDevice = "/dev/urandom"; | |
my $password = ""; | |
open RANDOMDEVICE, $RandomDevice | |
or die "Can't open random device $RandomDevice: $!\n"; |