LAN Turtle 107 - Man in the Middle DNSSpoof

LAN Turtle 107 - Man in the Middle DNSSpoof

Read More
LAN Turtle 106 - Man in the Middle with URLSnarf

LAN Turtle 106 - Man in the Middle with URLSnarf

Read More

LAN Turtle 105 - Remote File Systems with SSHFS

LAN Turtle 105 - Remote File Systems with SSHFS

Read More
LAN Turtle 104 - Persistent Shell Access with AutoSSH

LAN Turtle 104 - Persistent Shell Access with AutoSSH

Read More

LAN Turtle 103 - Metasploit and LAN Turtle with Meterpreter

LAN Turtle 103 - Metasploit and LAN Turtle with Meterpreter

Read More
LAN Turtle 102 - The Turtle Shell and Turtle Modules

LAN Turtle 102 - The Turtle Shell and Turtle Modules

Read More

LAN Turtle 101 - First Boot and Software Update

LAN Turtle 101 - First Boot and Software Update

Read More
What is the best security awareness payload for the Rubber Ducky?

What is the best security awareness payload for the Rubber Ducky?

A two second HID attack against Windows and Mac that launches the website of your choosing. That's by far the most effective security awareness payload for the USB Rubber Ducky.

Cyber security awareness building is important, and developing an effective security awareness program - or at least raising eyebrows that one is even necessary - doesn't need to be difficult.

Read More

Stealing Files with the USB Rubber Ducky – USB Exfiltration Explained

Stealing Files with the USB Rubber Ducky – USB Exfiltration Explained

As a keystroke injection attack tool capable of mimicking both a USB keyboard and mass storage, the USB Rubber Ducky excels at autonomously exfiltrating documents – or what we like to call performing an involuntary backup. In this article I will briefly outline the steps necessary to turn your USB Rubber Ducky into a document exfiltration machine, as described on Hak5 episodes 2112, 2113 and 2114.

Read More
The 3 Second Reverse Shell with a USB Rubber Ducky

The 3 Second Reverse Shell with a USB Rubber Ducky

In this tutorial we’ll be setting up a Reverse Shell payload on the USB Rubber Ducky that’ll execute in just 3 seconds.

A reverse shell is a type of shell where the victim computer calls back to an attacker’s computer. The attacking computer typically listens on a specific port. When it receives the connection it is then able to execute commands on the victim computer. In essence it’s remote control of a computer.
Read More

What's the quickest way to steal a Windows password hash?

What's the quickest way to steal a Windows password hash?

Using a USB Rubber Ducky and this simple payload, Windows password hashes can be captured for cracking in less than two seconds.

This technique works against almost all versions of Microsoft Windows and only requires a 5 line Ducky Script and an open source server setup on the target network.

Read More
15 Second Password Hack, Mr Robot Style

15 Second Password Hack, Mr Robot Style

Pilfering Passwords with the USB Rubber Ducky

Can you social engineer your target into plugging in a USB drive? How about distracting ’em for the briefest of moments? 15 seconds of physical access and a USB Rubber Ducky is all it takes to swipe passwords from an unattended PC.

In honor of the USB Rubber Ducky appearance on a recent episode of Mr Robot, we’re recreating this hollywood hack and showing how easy it is to deploy malware and exfiltrate data using this Hak5 tool.
Read More


Subscribe

Sign up today