![]() ![]() In this tutorial, we are going to determine the microcontroller of your USB flash drive, compile the source code published in GitHub for the tools we need, and move over to building a custom firmware with an embedded HID payload that will turn our harmless USB flash drive into a malicious keyboard designed to help us compromise our victim machine. Even though almost every USB flash drive is exploitable, the only released reprogramming method is for "Phison" microcontrollers. This scenario is often called an "HID Payload Attack," since you have to hand over your script to the Bad USB for the execution (more on that later). This allows us hackers to reprogram the microcontroller in them to act as a human interface device (HID), e.g., a keyboard, and perform custom keystrokes on our target machine. ![]() Most common USB flash drives are exploitable due to the "BadUSB" vulnerability. In addition, it would be nice to have something related on our WonderHowTo world. Recently, someone asked how to make your own "Bad USB," and I promised to make a how-to on this topic. Many of you don't even know about my existence here on Null Byte, so I thought of contributing something rather interesting. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |