WindowsLicenseKeyExfiltration

Title: WindowsLicenseKeyExfiltration
Author: 0iphor13

This payload exfiltrates the Windows Product keys from the target system. These can be saved in the registry and/or on the BIOS itself. Sometimes they can differ.

Credential harvesting is the method of obtaining credentials — think usernames and passwords. Many techniques are used to obtain credentials, from keylogging to credential dumping. With a set of credentials in hand, red teamers may access systems and make lateral movement across the network, as well as creating their own credentials which may be difficult to detect in a breach. See all credential payloads.

This payload is for the USB Rubber Ducky — a "flash drive" that types keystroke injection payloads into unsuspecting computers at incredible speeds. It's no wonder this little quacker has made appearances on Mr. Robot, FBI, Blacklist, National Geography and more!

Submit your own payload, or browse more featured USB Rubber Ducky Payloads.

 

 

Related Payloads

MacDocsExfill
MacDocsExfill
Exfilter all the images from the principal folders on unlocked MacOS targets. Stashes them in /loot/MacDocsExfill
Read More
Stop A Single Process In Windows
Stop A Single Process In Windows
This script can be used to quickly stop an active process on a windows machine. This script open the Task Manager app,
Read More
Exports all the links of the downloads
Exports all the links of the downloads
This script can be used to export all the links of the latest downloads made through Firefox. This script open the Fire
Read More