Power Shell Scripts for the Hak5 Ducky
*********************************************************************************
* Power Ducky *
*********************************************************************************
Main Menu host: No Server started
1) PowerShell ports: No Ports used
2) CMD
3) Exit
Choice:
All payloads are written in powershell so nothing should be caught by AV
Stores the meterpreter script on a web sever, the ducky will then go grab the script using ssl and execute it on the victims machine. Or Localy reflectly load Metasploit.
Dumps the lsass process through powershell, then reads the file and dumps it through a tcp socket to a listening server.
Module will save sys, sec and sam using reg.exe. It will then ship thefiles over TCP to a listening server.
Dumps all available wifi profiles, and then dumps each file through a tcp socket
Downloads a file and executes it on the victim's machine