The Pico NetCat
Reverse Shell script uses a Raspberry Pi Pico
as a USB Rubber Ducky
A Rubber Ducky is a hacking tool used to act as a HID-compliant device
(like a keyboard) and injects a payload using it (Like in Mr.Robot!)
Check out dbisu's Pico-Ducky and Hak5
NOTE, THIS IS ALL FOR EDUCATIONAL PURPOSES ONLY I am not held liable for any misuse of this script!
To install the Payload, first you will need to install the Pico-Ducky CircuitPython software.
1.Download the CircuitPython
.uf2 file and install it on your Pico.
2.Then you can download the adafruit-circuitpython-bundle-7.x-mpy-YYYYMMDD.zip
Extract the adafruit_hid
folder from the lib
folder of the downloaded file.
Put the adafruit.hid
folder inside of the Pico's lib
folder.
-
Then, save this and save it as
code.py
and put it inside the Pico's root. -
Finally, download the payload.dd file and save it as payload.dd on your Pico's root.
To create your own Payloads, you can use the USB-Rubber-Ducky-Wiki by Hak5 and create your own payload.dd
files and upload them to the Pico.
Here is a great video by NetworkChuck showing how to install the Rubber Ducky
here.
In order to Reverse Shell a Windows
Computer, you will want a Linux server listening to a specific port with NetCat
You will want to fill in the IP-ADDRESS-HERE
and PORT-HERE
with the port of your choice (preferably under 1000 to help avoid firewall detection) and the IP of your Linux Server
stty raw -echo; (stty size; cat) | nc -lvnp PORT-HERE
And replace the PORT-HERE
with the port of your choice
Take the Bad USB and plug it into a computer you own while the Linux server
is listening,
It will disable Windows Security
temporarily and execute the script quickly.
Then it is safe to unplug your USB and go to your Linux
machine
You should then have a fully interactive Windows Terminal
with control over the computer!.
Occasional unreliability and disconnection, cause is unknown