USB
Last updated
Last updated
Uses a slightly modified form of to exfiltrate data via Caps Lock, Scroll Lock, and Num Lock. A bit slow, but it works nonetheless.
Shows all DuckyScript payloads saved in ./payloads
Runs the payload when chosen.
Shows all LOLBAS payloads saved in ./core/LOLBAS.
Some payloads use environment variables, while some do not. None of them will tell you that, though, so it's not recommended to use this yet. Here's the list of the environment variables that the scripts use:
DS_FILE
is used for a target file on the host
DS_IP
is used for target IP address
DS_PORT
is used for target port of a command
DS_WEBDAV
is used for a web drive, ex: FTP drive for exfilling files
DS_EXECUTABLE
is used for a target executable, to run on the host
DS_REVERSE_SHELL
is used for a reverse shell on another host: example of this value is 10.10.10.10:8466
DS_INPUT
is usually used for input files, like a prompt or etc.
DS_OUTPUT
is usually used for output files, like logs
DS_SOURCE
is used for a source url, to download payloads or etc.
DS_DIRECTORY
is used for the directory of a file
DS_HEXFILE
is rarely used but is used for certutil-hex.txt
and more to come
DS_FAKEFILE
is used for alt. data streams
in cmd
, and is used for running a file as a batch file
Turns on and off the RNDIS ethernet adapter gadget. On boot, it is enabled.
Enable and disable the USB mass storage gadget. On boot, it is enabled. This also mounts it on Pwnhyve's linux system, so you can access files through SSH.
Hides the entire USB gadget, and make the device look unplugged to the host system.
When a USB drive is plugged in, this plugin will automatically scour the USB drive for valuable files - by default it's only document files, but it's editable in the main configuration of Pwnhyve.
By default, these file types are exfiltrated:
All found files are copied to /tmp/pwnhyveExtractedUsb
.