April 2017
Intermediate to advanced
350 pages
8h 35m
English
It may look like an ordinary USB on the outside, but in its core the device is composed of a micro SD slot placement which can be pre-programmed to deliver a payload as the device disguises itself as a keyboard human interface device (HID). Linux, Macs, Windows, and mobile Android devices are all potential platforms for the Rubber Ducky to infiltrate, as most standards are now HID compatible for simple plug-and-play. There is also a small button on the board to replay for another attack, saving you time from having to rescript the same attack on the micro SD . The Rubber ducky device includes a case to mask the device as any other USB storage commonly seen achieving promiscuity almost effortlessly. There are ...
Read now
Unlock full access