In this episode, Darren Kitchen digs into the cApS-Troll payload for the USB Rubber Ducky by Atomiczsec to discuss the workings and best practices of staged and non-staged payloads.
cApS-Troll by Atomiczsec: https://hak5.org/blogs/payloads/caps-troll-2
PayloadStudio: https://payloadstudio.hak5.org/
Discover Payloads: https://payloads.hak5.org/
Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
-----β-----β-----β-----β-----β-----β-----β-----β-----β-----β
Our Site β https://www.hak5.org/
Shop β null
Discord β https://discord.gg/hak5
Subscribe β null
Support β https://www.patreon.com/threatwire
Contact Us β http://www.twitter.com/hak5
-----β-----β-----β-----β-----β-----β-----β-----β-----β-----β
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community β where all hackers belong.
31 Comments