hashbang / darkwing

A covert pentesting platform embedded inside a USB Cable.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

DARKWING

http://github.com/hashbang/darkwing

License

About

NOTE: The following is all in DRAFT status and part of documentation driven development


DARKWING a pentestesting platform embedded inside a USB Cable. It is intended as a more covert alternative to the fantastic USB Rubber Ducky platform by Hak5 with an enhanced range of attack capabilities.

We use a powerful STM32F4 platform on a thin flexible PCB that can easily fit inside a USB Type C connector housing and be soldered directly to the connector.

It is named DARKWING after the most stealthy of all ducks. We also make it ALL CAPS because it makes it look more like an NSA project.

Use Cases

  • Run USB Rubber Ducky payloads
  • Installing malware via keyboard emulation
  • Sound exfiltration by emulating speakers
  • Screenshot by emulating USB-Type-C HDMI device
  • Mouse movement/click injection to prevent screen locking
  • Hidden data storage via internal flash memory
  • USB Device Authentication via custom kernel driver and device certificates.
  • Password management via hidden keyboard shortcuts and key injection
  • Device reverse engineering by logging USB packets from connected device

Requirements

Usage

TBD

Notes

Use at your own risk. You may be eaten by a grue.

About

A covert pentesting platform embedded inside a USB Cable.

License:MIT License


Languages

Language:C 96.3%Language:Assembly 3.5%Language:C++ 0.2%Language:Makefile 0.0%