http://github.com/hashbang/darkwing
DarkWing a pentestesting platform embedded inside a USB Cable. It is intended as a more covert alternative to the USB Rubberduck, designed to run a wider range of payloads that take advantage of the modern user habit of blindly trusting USB Type C cables.
We use a powerful STM32F4 platform on a thin flexible PCB that can easily fit inside a USB Type C connector housing and be soldered directly to the connector.
It is named Darkwing after the most stealthy of all ducks.
- Run USB Rubber Ducky payloads
- Installing malware via keyboard emulation
- Sound exfiltration by emulating speakers
- Screenshot by emulating USB-Type-C HDMI device
- Mouse movement/click injection to prevent screen locking
- Hidden data storage via internal flash memory
- USB Device Authentication via custom kernel driver and device certificates.
- Password management via hidden keyboard shortcuts and key injection
- Device reverse engineering by logging USB packets from connected device
- Development
- Production
TBD
Use at your own risk. You may be eaten by a grue.