Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
hak5
GitHub Repository: hak5/usbrubberducky-payloads
Path: blob/master/payloads/library/execution/-RD-UrAttaControl/README.md
3018 views

Logo

UrAttaControl

A script used to open an elevated powershell console and execute admin level commands

Description

Completely ran from the execute file. Replace the URL in that file with yours leading to a base64 script

This script will use IEX to download a base64 script to the $Payload variable

Using a keystroke injections attack a heavily obfuscated and encoded snippet will download and execute any base64

script saved in the $Payload variable

This payload completely bypasses the UAC and will run any admin level script without a prompt

You can use this function I wrote to convert your .ps1 sscripts to Base64

https://github.com/I-Am-Jakoby/PowerShell-for-Hackers/blob/main/Functions/B64.md

Getting Started

Dependencies

  • DropBox or other file sharing service - Your Shared link for the intended file

  • Windows 10,11

Executing program

  • Plug in your device

  • A keystroke injection based payload will run

Contributing

All contributors names will be listed here

I am Jakoby

Version History

  • 0.1

    • Initial Release

Contact

I am Jakoby


Project Link: [https://github.com/I-Am-Jakoby/hak5-submissions/tree/main/RubberDucky/Payloads/RD-UrAttaControl)

Acknowledgments