Skip to content

Stealing Chrome passwords with HID (Human Interface Device) emulation

License

Notifications You must be signed in to change notification settings

IAmStoxe/Google-Chrome-Password-Stealing-with-BADUSB

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Stealing Google Chrome Passwords with $1 USB Rubber Ducky (Digispark attiny85)

Stealing Chrome passwords with HID (Human Interface Device) emulation NOTE : This is for Educational purposes only. I shall not be liable for any damages caused by this. I DO NOT SUPPORT UNLAWFUL USE OF THIS PROJECT

BadUSB is a vulnerability in the microcontroller chip of every USB device, that let us reprogram the original firmware with a patched one, that makes a device type to be presented in the victim as an other type, usually HID keyboard. To demonstrate this, we use a cheap Arduino board “DIGISPARK ATTINY85”. This Board allows itself to be programed as a HID keyboard. Files used.

  1. s.ps1 – This is a powershell script that downloads a executable and then executes it to get an output file containing passwords. The script also emails the password file.
  2. wp1.exe – This is the executable that decrypts the saved passwords stored in the Login Data db file. The executable has an option to produce a .csv output file by using --o option.
  3. Digikeyboard.h – Keyboard Library for the microcontroller.
  4. Encode.ps1 - Small powershell script to convert plain text strings into BASE64 encoded string

About

Stealing Chrome passwords with HID (Human Interface Device) emulation

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published