Today we’re continuing on our series on exfiltrating documents with a USB Rubber Ducky. In the last part we tackled the stager payload which enumerated the drive letter of our USB flash drive and executed the staged payload. Today we’re looking at those stages and how they work.
Then finally we’ll be wrapping this up by combining the USB Rubber Ducky’s HID attack with Mass Storage firmware and encoding the ducky script.
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
Source: Security news