-
Notifications
You must be signed in to change notification settings - Fork 155
HIDKeyboardAttack
This attack turns your device and its OTG USB cable into a pre-programmed keyboard, able to type any given commands. Previously, only “Teensy” type devices were able to do this…but no longer! This attack generally works very well. However, if it becomes non-responsive, simply use the Reset USB button to freshen up the USB stack.
PowerSploit Attack
The PowerSploit attack requires a webserver to host the payload so you first need to ensure that the Apache server is running on your NetHunter device. You can start the service via the Kali Service Control section of the app.
Set the IP address and Port fields to the values you will use to configure your Metasploit listener and choose the payload you wish to use from the dropdown menu. In the URL field, enter the IP address of your NetHunter device or some other IP address that will be hosting the payload.
Verify your settings and tap the Update button. You will receive a confirmation that your settings were applied successfully.
Windows CMD
The Windows CMD tab executes the commands given in the box below. Update the commands to your liking and click the Update button to update the settings.
Menu Options
If you press the menu button you get access to several commands:
- UAC Bypass
From the UAC Bypass option you can choose to bypass UAC on Windows 7, Windows 8 or not at all.
- Keyboard Layout
If the computer you are exploiting are running an operative system other than English, you can set the keyboard layout here. Currently, the layouts available are English, French, Spanish, German and Swedish.
- Execute Attack
Executes the attack.
- Reset USB
If the attack becomes non-responsive, use this option to freshen up the USB stack.