Oct. 24, 2023, 6:34 p.m. | Hak5

Hak5 www.youtube.com

Can we trick our target into triggering a payload on their own computer, while logged in and working? We find out with some crafty payload tricks -- this time on Hak5!

0:00 - Intro
2:03 - Setup
3:17 - Payload Writing
4:22 - Cloning USB devices with ATTACKMODE
5:51 - Passive Windows Detection Extension
9:08 - Activity Detection with DuckyScript 3
12:08 - SMB Canary Keystroke Injection
15:10 - Payload Arming
15:45 - Testing the Payload
17:22 - USB Rubber …

computer devices find hak5 mods own payload red team rubber ducky target team usb usb devices working writing

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Security Operations Manager-West Coast

@ The Walt Disney Company | USA - CA - 2500 Broadway Street

Vulnerability Analyst - Remote (WFH)

@ Cognitive Medical Systems | Phoenix, AZ, US | Oak Ridge, TN, US | Austin, TX, US | Oregon, US | Austin, TX, US

Senior Mainframe Security Administrator

@ Danske Bank | Copenhagen V, Denmark