DUMPY_REVERSE_DUCKY

DUMPY_REVERSE_DUCKY
Download Copy
Title: DUMPY_REVERSE_DUCKY
Author: thenrglabs

preemptively disables USB HID devices by unloading the usbhid module on detection and performs a secondary verification by cross-referencing kernel input and sysfs data, immediately terminating the session if any HID class device is found. It also incorporates hardened UI behavior that locks the index position when tagging files.

Exfiltration is an involuntary backup. It's a technique for obtaining data from a network. Once obtained, the data may be removed using a number of methods. These may include traversing the network to a command and control server, such as Cloud C². The content is typically encrypted or obfuscated. In the case of physical access, a bring-your-own-network element may be included to evade detection. See all exfiltration payloads.

This payload is for Pineapple Pager — Two decades of WiFi exploits & payload mastery have come together. Pocket-sized. DuckyScript™ powered.

Submit your own payload, or browse more featured Pineapple Pager Payloads.

 

 

Related Payloads

Evil Portal
Evil Portal
A complete Evil Portal implementation for the WiFi Pineapple Pager, including captive portal detection and credential ca
Read More
Number Guesser
Number Guesser
Pager-safe number guessing game with 5 tries and cheat mode
Read More
Passpoint Scanner
Passpoint Scanner
Scanner for true Passpoint/Hotspot 2.0 networks. Detects Passpoint APs via IE 221 (HS2.0 Vendor Specific OUI 50:6f:9a:10
Read More