Hak5 2113 – Stealing Files with the USB Rubber Ducky Pt 2

Today we’re continuing on our series on exfiltrating documents with a USB Rubber Ducky. In the last part we tackled the stager payload which enumerated the drive letter of our USB flash drive and executed the staged payload. Today we’re looking at those stages and how they work.

Then finally we’ll be wrapping this up by combining the USB Rubber Ducky’s HID attack with Mass Storage firmware and encoding the ducky script.
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5

Source: Security news