• Premium IT-Security Tools
  • RFID Security
  • Digital Forensic
  • LEA & Rugged Products
  • Procurement
  • Premium IT-Security Tools
  • RFID Security
  • Digital Forensic
  • LEA & Rugged Products
  • Procurement

USB Rubber Ducky 2.0

139.00 €
incl. VAT, plus delivery
Low stock
Delivery time: 5 day(s)

Description

USB Rubber Ducky Hak5. Mr.Robot hacking tool....USB Keyboard for "auto script" ops - Keystroke Injection Attack Platform


Rubber Ducky USB Hak5


NEW USB Rubber Ducky Version!


Take Social Engineering to the next level with a USB Rubber Ducky Deluxe hidden inside an inconspicuous "thumb drive" case. All the fixings included. Hack like Mr.Robot with the USB Rubber Ducky.


Since 2010 the USB Rubber Ducky has been a favorite among hackers, penetration testers and IT professionals. With origins as a humble IT automation proof-of-concept using an embedded dev-board, it has grown into a full fledged commercial Keystroke Injection Attack Platform. The USB Rubber Ducky captured the imagination of hackers with its simple scripting language, formidable hardware, and covert design.

Rubber Ducky at Hakmac Blog!


Quack like a Keyboard!


Nearly every computer including desktops, laptops, tablets and smartphones take input from Humans via Keyboards. It's why there's a specification with the ubiquitous USB standard known as HID - or Human Interface Device. Simply put, any USB device claiming to be a Keyboard HID will be automatically detected and accepted by most modern operating systems. Whether it be a Windows, Mac, Linux or Android device the Keyboard is King.

By taking advantage of this inherent trust with scripted keystrokes at speeds beyond 1000 words per minute traditional countermeasures can be bypassed by this tireless trooper - the USB Rubber Ducky.


Hak5 Rubber Ducky - Ducky Script. Simply Simple.


The USB Rubber Ducky's scripting language is focused on ease-of use. Writing payloads is as simple as writing a text file in notepad, textedit, vi or emacs.

  • Type "Hello World" with STRING Hello World
  • Add pauses between commands with DELAY. Use DELAY 100 for short 100 milliseconds pauses or DELAY 1000 for longer 1 second pauses.
  • Combine specials keys. ALT F4, CONTROL ESCAPE, WINDOWS R, SHIFT TAB. They all do exactly as expected.
  • Use REM to comment your code before sharing it.
  • That's it! You just learned Ducky Script!



Unmatched Performance, Simplicity and Value.


We learned from the experiences of over 100 hackers worldwide working on the original prototype dev-board. Based on their feedback we developed a truly remarkable custom hardware platform with an order of magnitude more processing power and versatility.

  • Fast 60 MHz 32-bit Processor
  • Convenient Type A USB Connector
  • Expandable Memory via Micro SD
  • Hideable inside an in an innocuous looking case
  • Onboard Payload Replay Button



Cross Platform


Windows, Mac, Linux, Android - they all love keyboards. Convenience is king, so when it comes to plugging in a new input device the default is to accept and obey. Keyboards represent human input afterall. Before USB there were various standards, be it PS/2, AT, Apple Desktop Bus and various other DINs. Now that everything is Universal the Human Input Device is "Plug and Play".



Community Payload Generators, Firmware, Encoders and Toolkits


The USB Rubber Ducky project has fostered considerable innovation and creativity among the community. Some gems include

  • Customize pre-assembled attacks from our repository - Payload Wiki
  • Online Duck Toolkit for simple Reconnaissance, Exploitation and Reporting
  • The Simple Ducky Payload Generator for Linux with Password Cracker and Meterpreter and Netcat integration
  • VID & PID Swapper to cloak your device
  • Ducky-Decode Firmware and Encoder adding Mass Storage, Multiple Payloads, Multilingual and and much more.
  • And of course the USB Rubber Ducky Forums for Payload sharing, suggestions, questions and information.


Product safety information

Safety Notice: Penetrationtest Tools The use of Pentest Tools is subject to strict legal regulations. This device is a powerful tool for security analysis and penetration testing and must only be used in compliance with applicable laws. Unauthorized access to networks, privacy violations, or any other unlawful activities are strictly prohibited. Ensure that you have obtained explicit permission from the owner of the target network before use. Improper use may result in legal consequences, including criminal prosecution. Use the Pentest Tools solely for ethical and legal purposes, such as enhancing IT security within your organization or conducting authorized tests. The Manufacturer and the retailer assume no liability for damages resulting from misuse of this device. It is the user’s responsibility to comply with all local laws and regulations.

Manufacturer information
Manufacturer:HAK5Hak5 LLC, 5473 Blair Rd, Ste 100 PMB 39371, Dallas, TX 7523139371 DallasTXUnited States
shop(at)hak5.org
Responsible economic operator in the EU:HackmoD GmbHBessemerstr.8212103 BerlinGermany
info(at)hackmod.de