Hacking Experiment Using USB Rubber Ducky Scripting
Hacking Experiment Using USB Rubber Ducky Scripting
Benjamin Cannoles
Department of CSIS
University of North Georgia
Dahlonega, GA 30005, USA
[email protected]
and
Ahmad Ghafarian
Department of CSIS
University of North Georgia
Dahlonega, GA 30005, USA
[email protected]
73
Proceedings of The 8th International Multi-Conference on Complexity, Informatics and Cybernetics (IMCIC 2017)
74
Proceedings of The 8th International Multi-Conference on Complexity, Informatics and Cybernetics (IMCIC 2017)
privilege::debug
Sekurlsa::logonpasswords
5. HACKING EXPERIMETN
75
Proceedings of The 8th International Multi-Conference on Complexity, Informatics and Cybernetics (IMCIC 2017)
(New-Object
Net.WebClient).UploadFile('http://sp.canno
les.com/up.php','mimikatz.log'
Everything written in the cmd prompt does not get saved and
will be erased upon closing it. Unfortunately, the same does not
apply to the Mimikatz.log file and the command that was
written in the run dialog box. These can be quickly erased with
two commands. First, we will use the following to delete the
log file of credentials:
76
Proceedings of The 8th International Multi-Conference on Complexity, Informatics and Cybernetics (IMCIC 2017)
6. CONCLUSIONS
7. FUTURE RESEARCH
8. REFERENCES
Figure 6- Screenshot shows id and password [1] M. Al-Zarouni. The Reality of Risks from Consented Use
of USB Devices. School of Computer and Information
5.5. Attacks on Windows 10 Machine Science, Edith Cowan University, Perth, Western
As can be seen in Figure 6, the username Australia, 2006.
[email protected] and password Dummydummy [2] A. Caudill and B. Wilson. Phison 2251-03 (2303) Custom
have been retrieved in clear-text. Firmware & Existing Firmware Patches (BadUSB).
GitHub, 26, Sept. 2014.
After Windows 7, Microsoft changed the way that their [3] N. Falliere, L. O. Murchu, and E. Chien. W32. Stuxnet
operating system handled passwords. This vulnerability is not Dossier. 2011.
easily exploitable on Windows 10 without a registry edit. Due [4] Hak4. Episode 709: USB Rubber Ducky Part 1.
to the unique platform of attack, since we have physical access http://hak5.org/episodes/episode-709, 2013.
to the system, we can make a registry edit and allow this [5] Hak5. USB Rubber Ducky Payloads.
vulnerability to be exploited again. https://github.com/hak5darren/USB-Rubber-
Ducky/wiki/Payloads, 2013.
Because the way Windows registry works, performing this all in [6] K. Nohl and J. Lehl. BadUSB – On Accessories That Turn
one attack is very difficult. Therefore, on Windows 10, this Evil. In Blackhat USA, Aug. 2014.
attack must be split into two parts. [7] OLEA Kiosks, Inc. Malware Scrubbing Cyber Security
Kiosk. http://www.olea.com/product/cyber-security-kiosk/,
In the first part we have to edit the Windows Registry to enable 2015.
the vulnerability in Windows 10 and make it susceptible to the [8] S. Shin and G. Gu. Conficker and Beyond: A Large-scale
second part, which is the attack we have already created. Once Empirical Study. In Proceedings of the 26th Annual
we make the registry edit, the Windows account must be Computer Security Applications Conference, ACSAC ’10,
locked, signed out, or restarted before the registry changes go [9] J. Walter. "Flame Attacks": Briefing and Indicators of
into effect. We utilized the “reg add” command to recreate the Compromise. McAfee Labs Report, May 2012.
registry value that Microsoft has removed, and setting its value [10] D. Tian, A. Bates and K. Butler: Defending Against
to “1” for true. Malicious USB Firmware with GoodUSB. ACSAC ’15,
December 07-11, 2015, Los Angeles, CA, USA.
Once we add this value and the account is logged into once [11] BlackHat USA 2014, Karsten Nohl and Jakob Lell,
again, logon passwords will be stored in memory. The Ducky BadUSB - On Accessories that Turn Evil,
script for this part is quite similar but shorter than the previous https://srlabs.de/badusb/, Accessed on 07 Jan 2015
script. We ran powershell as an administrator again, then [12] S. Kamkar, USBDriveBy, http://samy.pl/usbdriveby/, Jan
performed the proper registry edit, and then launched the attack 2015
similar to the one we did before. Similar to Windows 7, we [13] Nikhil "SamratAshok" Mittal, Kautilya,
were able to retrieve the user’s credentials from the memory. https://github.com/samratashok/Kautilya, Jan 2015
77
Proceedings of The 8th International Multi-Conference on Complexity, Informatics and Cybernetics (IMCIC 2017)
78