Skip to content
This repository has been archived by the owner on Apr 25, 2019. It is now read-only.

HIDKeyboardAttack

Simon Brannstrom edited this page Jan 8, 2015 · 2 revisions

HID Keyboard Attack

This attack turns your device and its OTG USB cable into a pre-programmed keyboard, able to type any given commands. Previously, only “Teensy” type devices were able to do this…but no longer! This attack generally works very well. However, if it becomes non-responsive, simply use the Reset USB button to freshen up the USB stack.

PowerSploit Attack

The PowerSploit attack requires a webserver to host the payload so you first need to ensure that the Apache server is running on your NetHunter device. You can start the service via the Kali Service Control section of the app.

Set the IP address and Port fields to the values you will use to configure your Metasploit listener and choose the payload you wish to use from the dropdown menu. In the URL field, enter the IP address of your NetHunter device or some other IP address that will be hosting the payload.

Verify your settings and tap the Update button. You will receive a confirmation that your settings were applied successfully.

Windows CMD

The Windows CMD tab executes the commands given in the box below. Update the commands to your liking and click the Update button to update the settings.

Menu Options

If you press the menu button you get access to several commands:

  • UAC Bypass

From the UAC Bypass option you can choose to bypass UAC on Windows 7, Windows 8 or not at all.

  • Keyboard Layout

If the computer you are exploiting are running an operative system other than English, you can set the keyboard layout here. Currently, the layouts available are English, French, Spanish, German and Swedish.

  • Execute Attack

Executes the attack.

  • Reset USB

If the attack becomes non-responsive, use this option to freshen up the USB stack.

Clone this wiki locally