Hacking Computers from Blocks Away With a Wi-Fi Duck

339,227
0
Published 2020-03-06
The USB Rubber Ducky is a famous hacker tool that allows quick exploitation of a target computer, provided you know what script you want to run in advance. We’ll try out a new tool called the Wi-Fi Duck that allows a hacker to connect and run payloads from up to blocks away. This allows hackers to run USB Rubber Ducky like scripts without needing to know what kind of computer they’re hacking in advance.

All Comments (21)
  • Thank you for taking the time to teach us. I would like to address the people who think no one would leave their laptop unattended in a coffee shop etc. I am 60 plus and female. I can't tell you how many people have asked me to watch their laptop while they go to the bathroom, order another drink etc. I look "harmless". 💀
  • @sfperalta
    Sadly, an attack that relies on the stupidity of the clueless victim is an all-too-real scenario.
  • @rexleague8740
    You know he is a serious hacker when he has Stickers on his Laptop
  • @patthetech
    "or even worse(attack)" rickrolls brilliant.
  • Thanks for the update. We have docking stations at work where USBs (type a or c) can be plugged in. Not good. I learn something every day.
  • @benbeale2727
    Pretty sneaky... Also, don't end up on any security cameras plugging shit into random computers 🤣. That defeats the whole purpose of not leaving traces on the machine.
  • @kpopempire1475
    This is exactly why you install and activate the usbguard daemon on your Linux system.
  • @tribejudah9665
    I can imagine going to a friend's home for a barbeque, let's say the head project manager of XYZ company, and installing this on a company laptop if the USB isn't disabled.
  • @Therealguymins
    I enjoy your framed Sentient Hyper-Optimized Data Access Network
  • @dougaltolan3017
    If the same vulnerability would work with the ducky plugged into a USB hub which is plugged into the target machine then the ducky could also be that hub with a flash drive as one device and the keyboard as another. That way the victim could be persuaded to use the ducky as a functional flash drive. In which case to window for attack is much longer and there is no need for such surreptitious activity as plugging something into an unattended computer.
  • @AJ-lu3wx
    Me: "what's this strange peripheral device?...unplugs"
  • @statinskill
    I'll buy one when you figure out how to plug it in while sitting a mile away.
  • @djneon12
    this text was remotely place here.
  • @Yorak404
    I love null byte (Your Videos) so yea just subbed here, but but do you know how to get the lazy script to run on the new kali or another script like it?
  • @II-er7gj
    By the way - that sign Varonis on your backpack 0:18 in Latvian mean Hero! You are real security Hero!!! That is very nice!! :)
  • @TechMechRandom
    This is interesting. I am just not sure how I feel about it. There are better attack vectors that don't require many hands on deck and less risk of being caught. This would be one of those (sitting on the edge of your seat) attacks in a Mission Impossible suspense scenes. "Oh man, they are going to see the foot long tail sticking out of their laptop if they look. Oh no, they are looking..."
  • Pretty freakin awesome! Question! Can a regular nano adruino work as well as same with ESP8266 ESP be used as the same thing ? If so is scripts still the same?