EthicalHacker-EDC icon indicating copy to clipboard operation
EthicalHacker-EDC copied to clipboard

a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series

Building an Ethical Hacker Every Day Carry [EDC]

Created by : Chris Taylor [Blue Cosmo]

Resources:

  • YouTube - https://www.youtube.com/c/CosmodiumCS
  • Part 1 - https://www.youtube.com/watch?v=j0v0rJsWDdE
  • Part 2 - https://youtu.be/ao32BS8fwaM
  • Part 3 - https://youtu.be/5enuUn3fl5Y

Part 1 | Overview

in this part, we discussed what tools we will [probably] use for this project.

Here is the list:

  • USB RubberDucky
  • Shark Jack
  • Bash Bunny
  • USB A - Micro USB adapter
  • USB A - USB C adapter
  • USB C - USB A adapter
  • Custom Malware Drive
  • Parrot Security OS bootable drive
  • TP Link - Wireless Network Adapter
  • Micro SD Card adapter
  • 64GB USB Drive
  • 2200mAh Portable Charger
  • USB C - USB A cord
  • USB Ethernet Adapter Stickers
  • Hak5 Information Cards
  • KNIFE PEN!!!
  • Screw Driver
    • SIM Bit
    • 0.8 Bit [I-PHONE]
    • 1.2 Bit [MACBOOK]
    • PZ0 Bit [WINDOWS]

Part 2 | USB RubberDucky Wifi Exfiltration

in this part, we built a payload for exfiltrating wifi passwords from Windows 10 coputers
all code for this project is in the 'usbrd-wifi' directory
  • we took 'inspiration' from a script developed by 'brain eater'
  • in our modifications we:
    • allowed twinduck functionality
    • allowed for different file names for each computer we interact with
      • this lets us 'backup' multiple wifi passwords from multiple computers without overwriting the file
  • we then flashed the 'twinduck' firmware on to our USB RubberDucky

Links:

  • Unmodefied Script - https://forums.hak5.org/topic/40442-help-with-wifi-password-grabber/
  • DuckyFlasher - https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Flashing-ducky
  • USB RubberDucky Tutorial - https://www.youtube.com/watch?v=o1RbXtx0r4U

Part 3 | BashBunny Web Credential Stealer

in this part, we built a payload for exfiltrating saved 
wifi passwords from the users computer
  • we used a web browser password "recovery tool" in order to grab passwords saved by the browser
    • the software is created by Nirsoft and can be downloaded here - 'https://www.nirsoft.net/utils/web_browser_password.html'
    • we renamed the file[s] to "P" for a quicker payload
  • we then built a 'payload.txt' to run our duckyscript file [ducky-script.txt]
  • this duckyscript file will run our P.exe file, steal the creds, and save them to our loot directory
  • BY DEFAULT, THE SCRIPT WILL ONLY WORK IN SWITCH ONE
    • view "ducky-script.txt" on how to change this