e6yvr-7yaaa-aaaad-qf7rq-cai.icp0.io Open in urlscan Pro
193.118.59.140  Public Scan

URL: https://e6yvr-7yaaa-aaaad-qf7rq-cai.icp0.io/blog/hacking.html
Submission: On March 17 via api from US — Scanned from FR

Form analysis 1 forms found in the DOM

POST //translate.googleapis.com/translate_voting?client=te

<form id="goog-gt-votingForm" action="//translate.googleapis.com/translate_voting?client=te" method="post" target="votingFrame" class="VIpgJd-yAWNEb-hvhgNd-aXYTce"><input type="text" name="sl" id="goog-gt-votingInputSrcLang"><input type="text"
    name="tl" id="goog-gt-votingInputTrgLang"><input type="text" name="query" id="goog-gt-votingInputSrcText"><input type="text" name="gtrans" id="goog-gt-votingInputTrgText"><input type="text" name="vote" id="goog-gt-votingInputVote"></form>

Text Content

Home
Projects
Extras
Blog
Settings
About
Echo's adventures with 10 USBs

I recently ordered 10 64GB Micro Center USBs off of amazon and decided to use
them for a fun project - flashing different hacking tools and exploits to them.
This project was a great way to familiarize myself with various tools and have
them readily available for use in the future. (Mostly trolling)

To start, I did some research to determine what I wanted to flash onto my USBs.
I considered a variety of tools, including penetration testing tools, forensic
tools, and password cracking tools. I ended up choosing a mix of all three
categories, making sure to select a variety with different capabilities and
functions.

Once I had my list of tools, I began the process of flashing them onto my USBs.
The process of flashing a tool onto a USB involves copying the tool's files onto
the USB, and then configuring the USB to be bootable. This allows me to run the
tool directly from the USB, without having to install it onto a computer.

Some of the tools I ended up flashing onto my USBs include:

 1. Kali Linux: A popular hacking distribution of Linux that includes a wide
    range of tools.
 2. Ophcrack: A password cracking tool that can be used to recover Windows
    passwords.
 3. Autopsy: A digital forensics tool that can be used to analyze digital
    devices for evidence of criminal activity.
 4. Metasploit: A penetration testing tool that can be used to exploit
    vulnerabilities in computer systems.

I used a tool called Ventoy, an open-source tool for creating multi-boot USB
drives. It allows me to boot multiple operating systems or diagnostic tools from
a single USB drive. Which is pretty cool, so using that I was able use each
stick to is maximum potental in terms of storage



Then for the rest of them, I turned them into exploits following a post by
Catalin Cimpanu on bleepingcomputer.com and others that I had known about.

 1. Sh1mmer: A exploit to uneroll enterpise managed chromebooks by the mercury
    team.
 2. Rubber Ducky: A device that looks like a normal USB drive, but can execute
    malicious commands on a computer when plugged in.
 3. BadUSB: A firmware vulnerability in some USB devices that allows attackers
    to alter their functionality and execute malicious code.
 4. PoisonTap: A tool that exploits vulnerabilities in locked and
    password-protected computers to steal sensitive information and install
    backdoors.
 5. USBDriveBy: A tool that allows an attacker to remotely compromise a computer
    when a specific type of USB device is plugged in.
 6. Bash Bunny: A multi-functional device that can be used for a variety of
    hacking and penetration testing tasks, including executing payloads, key
    logging, and network reconnaissance.
 7. LAN Turtle: A device that can be used to perform various network-based
    attacks, such as man-in-the-middle attacks and rogue DHCP server attacks.

Most of these USB tools can be bought from Hak5 if you are too lazy to set them
up yourself, I have the Wifi Pineapple already. (Wifi users beware!)

Once all of the tools were successfully flashed onto my USBs, I tested them to
make sure they were working properly. I was pleased to find that all of the
tools worked as expected, and I was able to use them to perform various tasks
related to hacking.

In conclusion, this project was a fun and educational experience. I was able to
familiarize myself with several different hacking tools and have them readily
available for use in the future. I highly recommend this project to anyone who
is interested in learning more about hacking and security.

If you want to order some for yourself, click here: amazon.com

P.S. If you guys like me talking, I will do more :)

Further reading

 * https://hackeracademy.org/hack-any-system-with-a-usb-stealer/
 * https://www.bleepingcomputer.com/news/security/heres-a-list-of-29-different-types-of-usb-attacks/
 * https://infosecwriteups.com/how-i-made-a-programmable-hacking-usb-device-to-infiltrate-pcs-449726c5b23d
 * https://shop.hak5.org/products/usb-rubber-ducky
 * https://www.youtube.com/watch?v=kfaHJwcG2mg



© 3kh0 2023


Texte d'origine

Évaluez cette traduction
Votre avis nous aidera à améliorer Google Traduction