PAYLOAD: ICMP Data Exfiltration - USB Rubber Ducky/Exfiltration [PAYLOAD MINUTE]

Sdílet
Vložit
  • čas přidán 13. 12. 2023
  • Delving into the ICMP Data Exfiltration payload by TW-D for the USB Rubber Ducky, this time on [PAYLOAD MINUTE]
    Payloads → payloads.hak5.org
    ____________________________________________
    Hak5: Cyber Security Education, Inspiration & Community since 2005.
    ____________________________________________
    Shop → hakshop.myshopify.com/
    Subscribe → czcams.com/users/Hak5Darr...
    ____________________________________________
    Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.
  • Věda a technologie

Komentáře • 31

  • @drexalOS
    @drexalOS Před 6 měsíci +12

    I tried this. There's now a van with "Flowers By Irene" parked outside me house... how long does it take to deliver flowers?

  • @batica81
    @batica81 Před 6 měsíci +2

    Ha didn't know about space before command trick, quite fun! Btw I don't know what are you doing with video encoding/colors but it now has some 90s vibe which looks cool! :)

  • @repairstudio4940
    @repairstudio4940 Před 6 měsíci

    Thnx Darren! 🎉

  • @JonMurray
    @JonMurray Před 6 měsíci +1

    Awesome man!

  • @atajahangiri5861
    @atajahangiri5861 Před 6 měsíci +1

    VERY very GOOD video

  • @Angelinajolieshorts
    @Angelinajolieshorts Před 6 měsíci +1

    Great content creator

  • @LinedRogue
    @LinedRogue Před 6 měsíci

    Thank you 👍

  • @kevinwetsch5209
    @kevinwetsch5209 Před 6 měsíci

    Fascinating

  • @DavidStringham
    @DavidStringham Před 6 měsíci +2

    Would be nice to have a link to the actual payload to see what it actually does and maybe try it out.

  • @klamberext
    @klamberext Před 4 měsíci

    Interesting method

  • @iblackfeathers
    @iblackfeathers Před 6 měsíci

    a variant of this technique was presented at a very early toorcon in san diego and at defcon 10… called icmp moonbounce

    • @catatonicprime
      @catatonicprime Před 6 měsíci +1

      There's an entire ICMP overlay network, called Project Loki, described in phrack 49-6 too. And implementation discussed in phrack 51-6. ICMP is very cool for bypassing firewalls and the like and this payload could be reshaped to send much larger fragments at a time.

    • @iblackfeathers
      @iblackfeathers Před 6 měsíci

      @@catatonicprimeagreed.

  • @rationalbushcraft
    @rationalbushcraft Před 6 měsíci +1

    very cool. Can we do the same thing with DNS on a windows machine. Be good to get authentication tokens this way.

    • @DavidStringham
      @DavidStringham Před 6 měsíci +1

      DNS tunneling is a well-known technique.

  • @Westmadeit
    @Westmadeit Před 6 měsíci

    Can it be done on windows 10 and 11?

  • @gilbertbergh8980
    @gilbertbergh8980 Před 6 měsíci

    Looks alot like the exfil with the dns protocol.

  • @himanshuthakur9205
    @himanshuthakur9205 Před 6 měsíci

    U removed video!?

  • @kjrholmf472
    @kjrholmf472 Před 5 měsíci

    how to i change keyboard layout

  • @1980cantrell
    @1980cantrell Před 6 měsíci

    I tried this and it was all in the logs.

  • @toto99303
    @toto99303 Před 6 měsíci

    IPS firewalls will catch this as the signature is clear.

    • @DarrenKitchen
      @DarrenKitchen Před 6 měsíci +1

      that's good to hear. would encrypting the data before transmission help, or is it that there's any extra data in the ICMP packet as compared to what modern machines send?

    • @toto99303
      @toto99303 Před 6 měsíci

      @@DarrenKitchen the extra data, and basically the way they re-assemble the payload as they scan the icmp replies should be enough to catch it.

    • @CoinJarMusicVideos
      @CoinJarMusicVideos Před 6 měsíci

      A more effective approach involves synchronizing clocks and transmitting a standard ping packet within a designated time frame to convey a single bit's status. While this method may be slower, it significantly enhances the difficulty of detection and decoding, making it challenging for anyone to discern what's going on beyond a typical ping.

    • @DavidStringham
      @DavidStringham Před 6 měsíci

      I would try hex-encoding the data and using the output values to vary the size of the ICMP packets.

  • @shephusted2714
    @shephusted2714 Před 6 měsíci

    having it use tor would be nice, combine it with evercookie and store it in 7 places would be another session grabber, putting it on mbr part or in ufei areas could make it more resilient like logofail, lastly make it immutable with a flag switch to harden it a bit more #idle chattr

  • @fancy_bread5959
    @fancy_bread5959 Před 6 měsíci +1

    hi

  • @Secret-Robot
    @Secret-Robot Před 6 měsíci

    Ping!

  • @humanxoxo4
    @humanxoxo4 Před 6 měsíci

    Patrick Bateman