This project automates several open source technologies to dump and exfiltrate saved user credentials using a USB Rubber Ducky.
- Disable Windows Defender real-time monitoring
- Add an exception to Windows Defender for the
C:\Users\
folder - Download a custom-compiled version of LaZagne
- Download and launch the wrapper/exfiltration executable
- Save credential report to PasteBin
- Save PasteBin report URL to MySQL database
Executable files generated with PyInstaller are specific to the active operating system, so a Windows 10 VM with Python3 is required for this step.
python -m pip install -r requirements.txt
python -m PyInstaller --onefile lazagne.spec
python -m PyInstaller --onefile qa.py
The generated executables will be saved to the dist\
directory.
This webapp is responsible for hosting the generated executables and for keeping track of all PasteBin links. While building the executables requires a Windows machine, Linux or macOS is recommended for the webserver host.
Place the generated executables in the web/php/src/
directory on the webserver host.
Download ngrok and extract it to the web/tools/
directory. If you want a custom subdomain you will have to upgrade to a Basic plan, but the Free plan should be fine for short engagements.
Docker Compose is used to deploy containers for Apache/PHP, MySQL, and PHPMyAdmin.
cd web/
docker-compose up --build -d
./tools/ngrok http 80 -subdomain=quackattack
- Update
duckyscript.txt
with your webapp's URL. Make sure the .exe files are reachable. - Browse to
/ducky_encoder.php
and paste the contents ofduckyscript.txt
into the textfield on the webpage. - Press Generate Payload and download the
inject.bin
file it generates. - Copy
inject.bin
to the root of the Rubber Ducky’s microSD card.