This 2-in-1 device can act as a:
1. Keylogger
Capture every single button / keystrike from the target computer and store it on the local storage.
All you have to do is connect the thumb-sized keylogger to a usb port and connect the keyboard to it.
To view recorded data, retrieve the device and plug it in between the keyboard and USB port, then K, B, S at the same time.
The keylogger will appear as a removable devices which can be used exactly like a normal storage device.
The logs are stored in a file called LOG.TXT
2. BadUSB Keystroke injector:
This device can also be used to launch HID / BadUSB attacks. When configured to do so it registers itself as a keyboard and sends pre-configured key-strikes (payloads) to the machine that it is connected to, allowing you to execute a large number of attacks to harvest information or even gain full control over the target device.
To enable this first press S, B and K at the same time to mount the device storage. The device will appear as a normal storage device in the removable devices section. Past your payload there and name it PAYLOAD0.TXT (Checkout the notes below for more information on where to get these payloads and how to write your own).
Next you’ll need to tell the device when to execute the payload, to do so double click the CONFIG.TXT file and add a new line at the end of the file to set a trigger event.
Payload0Trigger=Auto
Save and close the window.
Now the device will automatically execute PAYLOAD0.TXT when it’s connected to a computer.
Notes:
- Enabling this feature does not interfere with the keylogger. Ie: The device will still register every key-strike and store it in local storage.
- The scripting language used in the payloads is identical to Ducky Scripts, click here to learn how to write your own and here for a list of ready payloads.
- You can set more advanced options and triggers in the CONFIG.TXT file. Checkout the manual for more info.
Reviews
There are no reviews yet.