Payload Triggering Tricks - USB Rubber Ducky Mods for Red Team Engagements - Hak5

Can we trick our target into triggering a payload on their own computer, while logged in and working? We find out with some crafty payload tricks -- this time on Hak5! 0:00 - Intro 2:03 - Setup 3:17 - Payload Writing 4:22 - Cloning USB devices with ATTACKMODE 5:51 - Passive Windows Detection Extension 9:08 - Activity Detection with DuckyScript 3 12:08 - SMB Canary Keystroke Injection 15:10 - Payload Arming 15:45 - Testing the Payload 17:22 - USB Rubber Ducky Mouse Implant Tips 17:53 - Thank you Hak5 community 18:21 - Review Our Site → Subscribe → ____________________________________________ Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Back to Top