T
Thekripton
Можно ли на Bad USB загрузить вирус удалённого доступа (njRAT,darkcomet rat)?.И при подключении Bad USB автоматический активировать его.
B правой части каждого сообщения есть стрелки ⇧ и ⇩. Не стесняйтесь оценивать ответы. Чтобы автору вопроса закрыть свой тикет, надо выбрать лучший ответ. Просто нажмите значок ✔ в правой части сообщения.
Познакомьтесь с пентестом веб-приложений на практике в нашем новом бесплатном курсе
Ещё пока небыло про это, жду пока доставят raspberry pi и напишу что да какPoisonTap еще неплохая такая вещь. Но под Raspberry Pi zero:
WhenСсылка скрыта от гостей(Ссылка скрыта от гостей& Node.js) is plugged into a locked/password protected computer, it:
- emulates an Ethernet device over USB (or Thunderbolt)
- hijacks all Internet traffic from the machine (despite being a low priority/unknown network interface)
- siphons and stores HTTP cookies and sessions from the web browser for the Alexa top 1,000,000 websites
- exposes the internal router to the attacker, making it accessible remotely via outbound WebSocket and DNS rebinding (thanks
Ссылка скрыта от гостейfor rebinding idea!)- installs a persistent web-based backdoor in HTTP cache for hundreds of thousands of domains and common Javascript CDN URLs, all with access to the user's cookies via cache poisoning
- allows attacker to remotely force the user to make HTTP requests and proxy back responses (GET & POSTs) with the user's cookies on any backdoored domain
- does not require the machine to be unlocked
- backdoors and remote access persist even after device is removed and attacker sashays away
Мне самому интересно, но нету пока возможности попробовать. Жду тогда от вас обзор). По описанию тема очень годная.Ещё пока небыло про это, жду пока доставят raspberry pi и напишу что да как
PoisonTap еще неплохая такая вещь. Но под Raspberry Pi zero:
WhenСсылка скрыта от гостей(Ссылка скрыта от гостей& Node.js) is plugged into a locked/password protected computer, it:
- emulates an Ethernet device over USB (or Thunderbolt)
- hijacks all Internet traffic from the machine (despite being a low priority/unknown network interface)
- siphons and stores HTTP cookies and sessions from the web browser for the Alexa top 1,000,000 websites
- exposes the internal router to the attacker, making it accessible remotely via outbound WebSocket and DNS rebinding (thanks
Ссылка скрыта от гостейfor rebinding idea!)- installs a persistent web-based backdoor in HTTP cache for hundreds of thousands of domains and common Javascript CDN URLs, all with access to the user's cookies via cache poisoning
- allows attacker to remotely force the user to make HTTP requests and proxy back responses (GET & POSTs) with the user's cookies on any backdoored domain
- does not require the machine to be unlocked
- backdoors and remote access persist even after device is removed and attacker sashays away
Спасибо, скажите весь функционал Kali будет работать корректно на всех моделях этой серии(Nexus/OnePlus)?Есть Kali Nethunter, который умеет BadUSB. Из коробки поддерживает Nuxus-ы и OnePlus. Хотя можно попробовать и под другие собрать.
offensive-security/kali-nethunterСпасибо, скажите весь функционал Kali будет работать корректно на всех моделях этой серии(Nexus/OnePlus)?
Incorporating all of the USB tasks on a single chip is an awesome feature that makes the WHID and boards like it truly unique. But it also places more stress on a single chip, and if anything goes wrong with that chip, the board becomes nearly unusable. It’s not uncommon for WHID’s to become “bricked” and unprogrammable. But, in most cases, the bricking is reversible!
The most common source of WHID “bricking” is uploading code to it with an incorrectly set board.
To revive the WHID, you’ll need to find a way to upload a sketch (even a default one is ok) to it with the board option correctly set. We can do this with a little help from the bootloader.
First, you’ll need to set the serial port to the bootloader. But that port is only visible when the board is in bootloader mode, so pull the reset line low twice quickly to invoke the bootloader reset feature discussed above. You can quickly press the reset button** twice. While the WHID is in the bootloader mode, change the ‘Tools > Serial Port’ menu to the bootloader COM port. Quick! You’ve only got eight seconds. [On Windows, the bootloader’s COM port number is usually one number higher than the Cactus WHID/Micro’s regular port number.]
**The reset button is a HALL sensor, that means you need to place a magnet close that side of the PCB, in order to simulate the "button pressure". And yes, it works also with WHID inside the USB case! So you don't need to extract the PCB from the plastic case everytime! :smiley:
open Arduino IDE and open ESP PRogrammer sketch
Insert WHID
Press Upload sketch
Start the unbrick phase with a magnet by placing it close that side of the PCB where the hall sensor is located (do it two times). Close-away-close-away
Обучение наступательной кибербезопасности в игровой форме. Начать игру!