forked from offensive-security/hid-backdoor-peensy
-
Notifications
You must be signed in to change notification settings - Fork 0
Reliable Teensy Penetration Testing Payload
License
theleestarr/hid-backdoor-peensy
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Teensy Penetration Testing Payload =================================== This Teensy sketch demonstrates the use of NUM / Scroll / CAPS Lock LEDs to communicate back and forth between a Windows computer and the Teensy. Using this method, we can "check" for success on execution of scripts, and get the Teensy to react accordingly. peensy.ino ----------- Requires a Teensy with a soldered SD, and optional DIP switch. More details about this can be found here - http://www.offensive-security.com/offsec/advanced-teensy-penetration-testing-payloads/. Make sure to choose: Tools-> USB Type -> Disk (SD Card) for the SD to kick in as a USB Storage device. peensy-stand-alone.ino ----------------------- Will work on an unmodified Teensy. We simply stripped out all the SD card and DIP switch relevant code. utils/teensy-payload-split.sh ----------------------------- Crude bash script to convert binary files for transfer from the Teensy SD to Windows, using echo commands. This utility should only be used when you are not mounting the SD Storage as a USB Storage device. File transfer rate is at around 22 kb/minute. A 100k byte file could take around 5 minutes to be transferred. Note: This peensy code has been cannibalized from multiple sources, including and not limited to : -- Social Engineering Toolkit -- Kautilya -- IronGeeks PHUKD library -- Various resources on the net.
About
Reliable Teensy Penetration Testing Payload
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published
Languages
- Other 89.5%
- Shell 10.5%