WindowsLicenseKeyExfiltration

Title: WindowsLicenseKeyExfiltration
Author: 0iphor13

This payload exfiltrates the Windows Product keys from the target system. These can be saved in the registry and/or on the BIOS itself. Sometimes they can differ.

Credential harvesting is the method of obtaining credentials — think usernames and passwords. Many techniques are used to obtain credentials, from keylogging to credential dumping. With a set of credentials in hand, red teamers may access systems and make lateral movement across the network, as well as creating their own credentials which may be difficult to detect in a breach. See all credential payloads.

This payload is for the USB Rubber Ducky — a "flash drive" that types keystroke injection payloads into unsuspecting computers at incredible speeds. It's no wonder this little quacker has made appearances on Mr. Robot, FBI, Blacklist, National Geography and more!

Submit your own payload, or browse more featured USB Rubber Ducky Payloads.

 

 

Related Payloads

Send Messages In Discord Channel-Server
Send Messages In Discord Channel-Server
This script can be used to send messages in a specific channel of a Discord text server. Open the GUI interface and tro
Read More
Tree Structure Of The Operating System
Tree Structure Of The Operating System
This script allows the exfiltration of the structure of the files contained in a machine, through the use of the tree co
Read More
MacDocsExfill
MacDocsExfill
Exfilter all the images from the principal folders on unlocked MacOS targets. Stashes them in /loot/MacDocsExfill
Read More