7:25 It's because the system can set (from inside) the CAPS lock and NUM lock state of keyboards. The keyboard is aware of change. So if the Ducky can be a keyboard, it also can be aware of such changes. If the script uses these state changes to transmit a message, the keyboard (here the Ducky) can read them and store the data into a file. It's genius.
@Clumrat2 жыл бұрын
Yeah that part blew my mind. Also 7:27 wysi
@thyros_2 жыл бұрын
yea that’s really smart
@vinylSummer2 жыл бұрын
@@Clumrat wysi
@BrendonKing2 жыл бұрын
@@sven957Sven subvert filesystem locks. Many enterprise systems don't allow for external storage to be connected, but keyboards are fair game. The script will just buffer the state changes to memory which in essence does the same thing.
@armata1432 жыл бұрын
@@sven957 Systems can detect when a script/executable is launched and blocks it. Using the keyboard to type a script though, different story.
@Mantris1002 жыл бұрын
For additional info, Rubber Duckies are INSANELY easy to access and learn. I built my own out of an Arduino - it’s pretty much identical in functionality to a Rubber Ducky 1.0 and it cost me maybe 6 Canadian Dollars. Granted, I use it to automate basic batch scripts to quickly troubleshoot Windows PCs for myself and some friends but anyone willing enough could definitely do some damage with it if they were so inclined.
@amil-d2 жыл бұрын
How did you use your arduino
@naxusv72322 жыл бұрын
raspberry pi pico works as well
@meme-hj5rs2 жыл бұрын
Github link of your code or it didn't happen
@ArsenGaming2 жыл бұрын
@@meme-hj5rs Do you realize how simple these devices are? The code would be maybe 100 lines long for a basic version. A more complicated one would maybe reach 500 or so. Anyway, these are really really simple devices.
@jantube3582 жыл бұрын
This makes a bit more sense to me. I wouldn't pay $100 just to Rick Roll a friend. But there is no Arduino with USB A so how did you do it?
@chicken-fried2 жыл бұрын
I did a project on this in college in 2014 and nearly got a failing grade because my prof said it was unrealistic. I've seem so many things that work like rubber duckies since and it's just grinds my gears every time! These things are neat but dang can they do some harm.
@roeulogy2 жыл бұрын
In a white hat sense, I've been doing this since about 2000(ish). Kinda made ninite, but before ninite was a thing (i think). I just wasn't playing as a HID device because I had everything I did scripted at the time. That prof, I really hope he now gets "defcon" famous.
@RobotnikPlays2 жыл бұрын
Should've left a ducky stick next to the professor's car door or office door with a payload that just launched notepad and typed "I told you so"
@PrograError2 жыл бұрын
could you apply for a revision then... obviously a revision of HS grade could happen... after you already finished uni...
@antoniolim7622 жыл бұрын
"my prof said it was unrealistic"...are the words highly SUS tech people use to deflect from what they "actually" do...hidden in plain sight...faking ignorance to avoid getting known for actual know-how (:D)
@dothedewinmeАй бұрын
@@RobotnikPlays dude. You still can lol
@LinusTechTips2 жыл бұрын
We need to properly thank I-Am-Jakoby for their various contributions to the Rubber Ducky community! Their work made a lot of this possible. Check out their github for some really useful Rubber Ducky resources: github.com/I-Am-Jakoby
@timunwerner9902 жыл бұрын
Disappointed that Linus did not drop the Rubber Ducky
@IamJakoby2 жыл бұрын
Thank you sooo much! It was an honor alone just to be in a video!
@PlanetXtreme2 жыл бұрын
@@IamJakoby Epic, you're the legit channel too and not a fake advertiser
@IamJakoby2 жыл бұрын
@@PlanetXtreme I appreciate you! I've put a lot of effort into trying to make something legitimate to offer 😀
@pimpstick22 жыл бұрын
Don't mind me riding Jakoby's coat tails here 😉 Funny to see my 32 wants the D payload refrenced. People can feel free to check out my repo as well.
@BartDerudder2 жыл бұрын
For testing: use vm snapshots to return to a previous state. To get the rubber ducky to work in a vm, pass trough a usb hub or pci card directly to the vm. (not the ducky device itself, that's going to cause issues)
@OrlandoTiquim8 ай бұрын
I once heard you still have risks even when using VM for testing bc it could infect your network between it and your "main pc environment"
@crispyybaconx2 ай бұрын
@@OrlandoTiquimwell yeah you could... if you program it to
@willwunsche69402 жыл бұрын
I remember learning about these many years ago in some certification classes I took when I was 14 & 16. A lot of server places will actually have their USB ports flat out disabled to prevent physical malware attacks and cables locked away behind metal from where they can be physically tampered with the prevent wire tapping even if they are already in locked facilities.
@gamingmarcus2 жыл бұрын
That's actually another good reason to have these onboard USB ports on server boards. Besides having physical access you'd have to take apart the server in order to install the USB device.
@roberttalada51962 жыл бұрын
Or just keep people out of the server room with proper physical security controls. As a server admin, I need USB sometimes
@seshpenguin2 жыл бұрын
@@roberttalada5196 Yep, if an adversary has physical access to a server, it's basically game over anyway.
@pieterrossouw85962 жыл бұрын
Saw a server in our university lab that had its front facing USB ports epoxied closed. In a space where students both need to have access to servers to learn and eventually will try stuff like this, I guess it made some sense.
@bobblueton2 жыл бұрын
I knew a guy who worked at a place who super glued all their USB ports and installed tamper alarms (Visual and audio) to their terminals. It was a medical office who got hit with some type of ransomware after a disgruntled patient didn't get their refill.
@Skreamies2 жыл бұрын
Finally a video on these, they've been a thing for ages! Never plug in a random flash drive you've found or been given a lot of the times.
@Turboy652 жыл бұрын
It's pretty much the equivalent of going rawdog at a lights-out group grope. (orgy)
@corvettec-dt1eq2 жыл бұрын
I have a computer that only has an Ethernet port for network connectivity, no wi-fi or bluetooth interfaces that I use for this purpose. It has no data on it except for the OS, and the Ethernet port remains unplugged always
@TheLongDon2 жыл бұрын
@@Turboy65 Lol where do you find these things
@Turboy652 жыл бұрын
@@TheLongDon Make lots of kinky friends, wait for the flash mob....LOL....
@MeAMoose2 жыл бұрын
@@Akkbar21 Not really; having an experimental sandbox computer can be really useful, if not for avoiding physical hacking attempts from USB devices then installing suspicious applications to test them first before installing them on your main machine.
@dogbog992 жыл бұрын
These things have been available for over a decade, I’m surprised Linus has only just made a video on this cool device.
@RedneckIrishman2 жыл бұрын
I was just gonna type the exact same thing :D
@Kitteh0teh0cat2 жыл бұрын
He says it's been a thing for a decade but a new version was released this year.
@namonaite2 жыл бұрын
I mean he got them for the lab, might as well make a video while at it.
@MaxwellVador2 жыл бұрын
He’s been making videos on these types of malicious USB drives for the better part of a decade.
@namonaite2 жыл бұрын
@@f3rny_66 Also maybe they believed they could make a better video now, with a more experienced team of writers and editors, and just used the excuse that they got a bunch of them for the lab to also make a video on them.
@S4sch4_972 жыл бұрын
As an IT guy you could test your clients IT Security Awareness with these and load a script onto them, that automatically books the person into the next Security Seminar, so they can learn what to do the next time they find a random USB Stick
@freedustin2 жыл бұрын
What about the OMG cable? How you gonna teach people to avoid a normal ass lookin cable?
@KJ4EZJ2 жыл бұрын
My previous employer did the phishing email version of this. You click the link, you get (polite, short) training. I always thought they were super obvious. There were only ever two emails in four years that made me wonder. Doing the same with USBs would be cool.
@darin75532 жыл бұрын
I like your idea
@KJ4EZJ2 жыл бұрын
@Ian Visser Lol! No. Companies pen test themselves and run "simulated phishing" campaigns against their own employees all the time. Any company serious about cybersecurity should be doing stuff like this. I wouldn't do it unilaterally unless you are the head of IT or cybersecurity and have already built credibility, but you really want to tell as few employees as possible these types of exercises are going on until they are over.
@RobbeSeolh Жыл бұрын
LMAO
@dylanjones54202 жыл бұрын
Hak5: it was made to automate mundane office tasks Also Hak5: "Attack mode"
@traorelala2 жыл бұрын
thanks
@ivyivyyiivvvyyyyvy Жыл бұрын
Yeah, among other things, if they wanted it to not be used for malicious purposes, they wouldn't have made it look so mundane. Clear irresponsibility on the part of the creators.
@wadewilson5446 Жыл бұрын
He ptorek He attak but more importantly, he automate mundane office task
@notbalisongflipping Жыл бұрын
Take you for explaining now I can understand it clearly
@laplongejunior Жыл бұрын
@@ivyivyyiivvvyyyyvy "if they wanted it to not be used for malicious purposes, they wouldn't have made it look so mundane" I think the implication is that your boss wouldn't know you're automating the mundane office tasks you are paid for.
@BrodieFairhall2 жыл бұрын
I still use my original rubber ducky to automate all kinds of things and to demo why you don't plug in random flash drives. Such an amazing piece of kit and the rubber ducky 2.0 is even more amazing!
@JonLinde2 жыл бұрын
So it isn't just me... Never figured out why nobody else put them to good and practical use.
@BrodieFairhall2 жыл бұрын
@@JonLinde I know right!? It has been an absolute life saver for multi hour system setups etc
@treeskers2 жыл бұрын
@@BrodieFairhall can you elaborate on your usage? like what kind of things are you automating with this
@BrodieFairhall2 жыл бұрын
@@treeskers one good example from years ago was setting up some HMI PC's for a scada system. They were all the same except for some customer names etc. It involved imaging the OS, mapping a network drive to a file server, then installing various software that required the customer name or specific files to be linked on setup (which is why we couldn't just image everything). Then all the manual files were copied over, registry edits made etc. We would just change the customer name and a couple of details in the ducky script, put the DVD with the OS image in the machine, plug in the rubber ducky and turn it on.
@blablabla1000able2 жыл бұрын
I don't get why you can't do all that with a regular usb drive and just run some executable file manually that does all you want it to do?
@SignalBoost2 жыл бұрын
Hak5 brings back so many memories. I'm glad the LTT labs people found a use for their duckies, but I'm not sure I learned all that much.
@daysiewaysie2 жыл бұрын
ahh yes, those fond memories of when Matt Lestock and Paul The Camera Guy were on the team. i stopped watching when Matt left.
@supercheetah7782 жыл бұрын
This video isn't really for anyone who already knows about Hak5 though. It's for everyone else that doesn't.
@RedHeadWolf1172 жыл бұрын
Security analyst here, I've only seen one on a network once, they're pretty interesting! I hope you guys cover more cybersecurity topics
@the_undead10 ай бұрын
I love the people in this comment section who are talking about how much of a threat these are or similar comments, these are a pretty risky attack from a risk reward perspective because you need to make damn sure that your fingerprints are not on the device, so your average person shouldn't be too concerned about these. Just know they exist and leave it at that
@carloaarnink Жыл бұрын
6:00 4 months later and this has suddenly become a real story XD
@carlj2382 жыл бұрын
I would love for LTT to do more videos on Cyber Security
@e.l.65622 жыл бұрын
After seeing what their "server room" looks like, I'm not sure that I would trust them
@x_____________2 жыл бұрын
I wouldn't unless they have someone who actual has some Cybersecurity accreditation or experience.
@trajectoryunown2 жыл бұрын
@@e.l.6562 I wouldn't use personal practice as a gauge for someone's aptitude. Just think of how many peak athletes are coached by people who would never have even dared to strive to compete on the level of the people they train. As long as someone knows what they're talking about that's enough to be taken seriously. Given that I'm effectively clueless in this field, I'd rely on comments from people in the cyber security field and other sources to determine the value of any information put forth anyway. With LMG's core audience, you've got to be mindful that little of what they do will actually be comprehensive or even entirely accurate. Even so, they are in a prime position to spark someone's interest something they'd never considered thinking of before. In that regard, I think even partially inaccurate advice is better than nothing. It would at least give newbies a starting point to research even if it's nothing more than a few key words or phrases they're unfamiliar with.
@Zurfy2 жыл бұрын
@CGG_GSS Then why are they doing a video about cybersecurity?
@FightingSportsMedia2 жыл бұрын
But he should stay away from talking about the programming. A lot of what he said was not correct or the fault of the device.
@awakenedcrowl2 жыл бұрын
I always laughed at people for "acting like just plugging in a single USB stick could cause THAT much harm". I guess, I was the fool.
@vgamesx12 жыл бұрын
Guess you also haven't seen those USB killers everyone was talking about like ~5 years ago, it's possible to destroy an entire computer by simply plugging in a USB stick.
@FlameMage22 жыл бұрын
Have you seen the USB Killer too?
@awakenedcrowl2 жыл бұрын
@@FlameMage2 I had seen that (USB Killer), but also only recently
@awex72 жыл бұрын
it doesn’t have to be a use lol you could make your own homemade one that can fit into any type of plug output
@SpaceRanger1872 жыл бұрын
You can even take over ATMs...so I've heard
@BCProgramming2 жыл бұрын
Before USB there were versions of this for PS/2. They were largely used for some of the same legitimate tasks, usually some form of automation, or, in some cases they could act as a converter between RS-232 and PS/2 for some serial devices. The tricky part of these USB HID "attacks" is that unlike the old route of a malicious autorun, you can't avoid it by holding shift, and of course once it's plugged in, it gets activated and can start "typing". Some AV software has started adding "keyboard authorization" features to try to combat these types of devices. One interesting approach of dealing with a suspicious "drive" is to plug it in while in a VM (with shortcuts to 'escape' the VM disabled) . Even though it will connect to the host machine, if it is device like this, then keystrokes it tries to send will go to the VM. Heck a MS-DOS VM running a tiny DOS program that just logs key scancodes to a text file could even provide insight on what exactly it is trying to do.
@petelee24772 жыл бұрын
Can it access the host machine even if the operating system was different from the virtual machine
@aravindpallippara15772 жыл бұрын
@@petelee2477 it's an automatically typing keyboard - it requires exactly right context (usually empty desktop) to start working properly
@KJ4EZJ2 жыл бұрын
@@petelee2477 Don't rule it out. Malware can escape virtual machines. With this tool in particular, unlikely.
@r3d53v3n2 жыл бұрын
Glad that your highlighting security tools, tricks, and remediation. Keep doing videos like this. As a security professional I think tech KZbinrs can play an important role in educating users
@michelyannakis535 Жыл бұрын
Wow this is scary. I am sure someone could modify a keyboard using a hub and a build in rubber ducky to make it look even less harmfull. If someone receives a USB keyboard by mail, if it looks better than their current keyboard, I am sure many wouldn't hesitate to plug it in their computer to try it.
@AudreyAdz Жыл бұрын
That is a shockingly terrifying and also very clever idea tbh
@minarchisttrucker2775 Жыл бұрын
There's a ducky hidden inside a charging cable that has a wifi connection to control remotely. You can't tell a difference between it and a normal charging cable
@frosty129 Жыл бұрын
Or ANY usb device for that matter. Webcam, mouse, printer, once the USB gets plugged in, it's game over.
@suzierottencrotch7893 Жыл бұрын
Theres already something called duckhunt which detects ultra speed typing.
@minarchisttrucker2775 Жыл бұрын
@@suzierottencrotch7893 you just slow the typing speed down to a human level and while slower is still automated
@beanjeangreen2 жыл бұрын
Would absolutely LOVE an LTT deep dive on Hak5 tools
@LakeVermilionDreams2 жыл бұрын
This better be the start of a Hak5xLTT collaboration! Fly Darren and Shannon up to The Lab and let's get a few videos out of this!!
@GB5702 жыл бұрын
Yes! I'd love to see that
@anon_acc2 жыл бұрын
@@GB570 Hell nah, the way the Rubber Ducky for example works is people simply not being aware of it. Any kind of attention kills it, so a KZbinr with about 15 million subscribers making a video specifically about it is horrible. Not for Hak5, but for the users. The OMG Cable would be another example, also from Hak5.
@supercheetah7782 жыл бұрын
@@anon_acc You're missing the point of Hak5. They want more people aware of security vulnerabilities so that they know what to look for to protect themselves.
@DavidStringham2 жыл бұрын
@@anon_acc I don't think that Hak5 would agree. They want people to be aware of the threats posed by their tools.
@DavidStringham2 жыл бұрын
A collab would be a great idea!
@hardrivethrutown2 жыл бұрын
Just now do I realize that I actually want one of these, being able to plug in a drive and have it automate a couple commands looks useful as hell
@goldenhate66492 жыл бұрын
I saw this an my first thought was automating installing emulator games via USB
@nemtudom5074 Жыл бұрын
6:11 4 months later that has never been more ironic, LMAO
@thegift6749 Жыл бұрын
Colton crying after opening the company to a cyber threat is very foreshadowing xD
@paytyler2 жыл бұрын
This sounds like a dream come true for every of Linus's viewers who have grandparents.
@ducksongfans Жыл бұрын
they dont even know that they have usb poerts or what usb is
@CHURCHISAWESUM9 ай бұрын
@@ducksongfansthat moment when being illiterate is the best defense 😂
@Seytonic2 жыл бұрын
You know wireless BadUSBs exist, they're open source too : ) search for them on KZbin
@raresandrei72052 жыл бұрын
Oh Seytonic, glad to see you here
@Jbryan09 Жыл бұрын
“There safe trust me”
@Adam-kl9uf Жыл бұрын
Yo it’s seytonic love the videos dude
@DavidStringham2 жыл бұрын
I was wondering if LTT would do more security-related videos like the Rubber Ducky. I was pretty excited for this.
@mhammadalloush51042 жыл бұрын
Those are old news, but its good that someone from the mainstream is actually covering this attack venue, and yet another lesson on why not to plug random USB accessories willy nilly
@ChrisPBacon-fx3ut2 жыл бұрын
I guess so, even their wifi and ethernet taps are old stuff too
@ChrisPBacon-fx3ut2 жыл бұрын
@@username8644 i get the sentiment, but bro i just ahd a stroke
@novamaster02 жыл бұрын
I've been watching Hak5 since 2006, LTT since about 2015..... I was SUPER excited to see this video pop up. I really really hope there's more! Commenting for the algorithm to show this is a great video!
@Thermalions2 жыл бұрын
10:35 Thanks Linus. Now I know what a rubber ducky looks like. I can safely plug in that USB I found this morning on the sidewalk - it doesn't have that folding silver shield on it, so can't be a rubber ducky.
@adoatero51292 жыл бұрын
That's what I thought it was first too. I think Linus didn't think that part of the otherwise good presentation through. I also would have liked to see some practical advice on how to avoid being hurt by this in real life (other than the obvious "don't attach a USB drive that you find on a street to your computer). Anyway, I think this was a very interesting and generally very well made presentation.
@m0x34riou2 жыл бұрын
At a University near where I live they scattered 50 of these around with a simple script to ping a specific IP so that they could record how many People plugged it in. They recorded 80 different IP Adresses.
@QuackZack2 жыл бұрын
So in other words, it'd be stupid easily to hack people if you had malicious intent? And people let their curiosity get the best of them rather than their common sense?
@freedustin2 жыл бұрын
@@QuackZack at random yeah, good luck nailing a specific target tho.
@KJ4EZJ2 жыл бұрын
@@freedustin With a little social engineering, no problem. Send a "free" flash drive in the mail as a fake promotional. Give it to them in a swag bag. Become their friend and tell them the photos from the other night are on there. Convince them to print or scan a specific type of item at their local print shop that requires a flash drive and make sure, when they go looking for one (because who has those laying around anymore besides tech people thanks to the cloud), the malicious one is the first one they find. There are a million ways you could social engineer a specific target into plugging a USB into one of their computers. That's just what I came up with in one minute...get creative.
@fermitupoupon17542 жыл бұрын
Ah yes, the old USB port as an attack vector. Funny you should mention DSM, because one of their SysOps gave a talk at a local small time Defcon type of convention and he mentioned the use of hot melt glue to stop USB port based attacks. Still I always figured that given what we did as kids in high school during the 90s these kinds of attacks would be obvious by now. All of the computers in HS ran NT4, so their drives were NTFS. Except for the computers in the computer lab, because due to curriculum requirements those were W95 machines. Now IT had considered that diskettes would be an attack vector, so they passworded the BIOS and made the A and B drives non-bootable. Except they messed up. All the BIOSes had the same password. Windows 95 is basically a glorified DOS shell, so any user would have low-level access to the hardware. So use W95 to make a dump of the BIOS, take it home, grep the password from the dump. Prep a muLinux diskette with the NTFS read kernel driver, use BIOS password on NT4 box to enable booting from diskette. Boot up muLinux, grab the SAM files, take em home and run L0pht at your leisure. It left no trace on the school computers and meanwhile we had Domain Admin level access.
@ItsDank Жыл бұрын
man you old
@Tiger21820 Жыл бұрын
This could be very useful for destroying scam call centers, because you know how much of a plague those scammers are! Create a script that completely wipes the servers and BOOM! No more call centers!
@iamJDC Жыл бұрын
5:56 the irony here is palpable - this scene didn't age very well for LMG.
@TehStoni2 жыл бұрын
as a cyber security professional i would love to see LMG pick up more cyber content. LinusSecTips????
@osharpey72932 жыл бұрын
LTT x John Hammond collab is what i wanna see
@theBabyDead2 жыл бұрын
That name will 100% get abused.
@14b3am2 жыл бұрын
@@theBabyDead that's the point
@TehStoni2 жыл бұрын
@@theBabyDead perfect
@jamerperson2 жыл бұрын
Just go watch Hak5 or Seytonic. Those guys already do a great job at it.
@taronzgaming77392 жыл бұрын
The main infosec advice I give to people is simple "Unless you know what it is, don't put it in". Works decently for other bad decisions you make sometimes too.
@liaminwales2 жыл бұрын
LTT needs to do a video on installing windows and user V admin accounts and how to set them up to be secure, topics like login options for users and how they matter.
@drk_blood2 жыл бұрын
That recreation of the Mr.Robot's scene with the usb thumb drive taken and plugged in by the cop was funny AF with Colton being the victim 😂
@Yeoffrey2 жыл бұрын
I've been using a ducky for 5 years to automate changing settings in windows and install software for machines we sell to customers to ensure that they are ready to use out of the box.
@slhuck2 жыл бұрын
Can you build a 5 minute version of this? I would love to share this with my non-technical staff, just so they can know the danger. Heck, that would be a fantastic new channel--security issues for non security people.
@KJMcLaws2 жыл бұрын
That would be amazing. I want to send this to my family too.
@esatd342 жыл бұрын
Im into that
@madness19312 жыл бұрын
Isn't that just Techquickie? Dumbed down tech info, for the average Joe.
@slhuck2 жыл бұрын
@@madness1931 I’m thinking more like Security in Brief. Most security information geared to the regular user is full of stock photography and over explained by experts. The section on USB sticks and how they pose a security threat was the simplest I’ve seen. That could be done for phishing, passwords, etc. Maybe sans the condom, as that wouldn’t fly in my environment. But the security content was perfect for my users.
@PrograError2 жыл бұрын
@@slhuck and hosted by jake or anthony.
@joegon62782 жыл бұрын
I always wondered if they were going to ever release a newer version of the Duckie, I've had mine for years and it is a super useful tool, especially if you work in I.T. and have to do mundane task, I use mine to install software we use at work after a reimage
@esimp7542 жыл бұрын
I moved away from theirs to Michal monday on github he has a supreme ducky albeit a bit out of date now but found it loads better than hak5s not looked into their 2nd version.
@bitB3AR Жыл бұрын
6:00 This did not age well post session cookie hack.
@bwabbel2 жыл бұрын
I hope the dide taking the usb stick to IT security got a bonus. Hardly anyone does that. Even many IT people would just carelessly plug it in. And that's why social engineering is even a thing. If technical security measurements get better and better, the only weakness that's basically impossible to reliably patch is the user. Humans will always make mistakes. That's why it's more important than ever before to make people aware of those threats and educate them. I think that devices like this should be legal. The main reasons are 1. Someone will do it anyway, no matter if it's legal or not 2. If it's done anyway it's better to make it public to show that devices like that exist and what they can do
@fish_bacon Жыл бұрын
Colton running malicious software did not age well in hindsight did it? :P
@Camouflagedcamo2 жыл бұрын
So cool to see Linus tackling some cybersecurity now. Everyone could use some extra awareness.
@cherrypepsi28152 жыл бұрын
I'm surprised he hasn't reviewed one of these sooner. I've used these for years, amazing tools, but also pretty deadly if you wanted to use it as such
@laneh74492 жыл бұрын
Love seeing this, I would love more security integration from LTT in videos ❤
@whyzzzcat2 жыл бұрын
That Jacket is Wild. Straight outta the 90s. Love it.
@storm40452 жыл бұрын
Hey linus i doubt this will ever been seen but ive got an idea for a video for you, i recently bought a gaming laptop with an i7 and 3060 and it gave me the inspiration for the idea. The challenge is get every big computer youtuber you can think to chip in a single completely random spec component of a custom gaming pc (good or bad) preferably intel and give it away to a random fan ones the build is complete
@kevoqq2 жыл бұрын
You really emphasized "Being safe" at the end there🤣
@cyrilsli2 жыл бұрын
😂
@Chris_Rybowski2 жыл бұрын
I was NOT ready for that
@silentfox82 жыл бұрын
These are VERY useful tools, different versions too!
@spacehuhn2 жыл бұрын
Great video! Thanks for educating about this kind of attack 😃 Been working on a couple of Open-Source BadUSB projects myself recently.
@MaxxDJ292 жыл бұрын
I bought one of these to automate iPad and Mac deployments when we aren’t using DEP. Saves SO MUCH TIME, it just needs to be updated occasionally
@RuxUnderscore2 жыл бұрын
The Writer, Tanner McCoolman, was excellent for this video. As someone that was trained in CySec and learned how to use a USB Rubber Ducky, it was very well explained on how this attack vector works!
@rickseiden12 жыл бұрын
I remember in the late 80s/early 90s we had to write software on public computers and the only way to save our code was with floppies. We were constantly running into issues where our own floppies that we bought and formatted on our machines, got infected.
@3polygons2 жыл бұрын
Yep, I remember that. First the 5.25 inches, then the 3.5 ones. And those utilities allowing to use extra capacity (2mb total, I think) beyond 1.45 mb. Or the ones which could be used to fake a ram disk to allow certain installations. I remember always knowing even which floppy disks I had as infected. You could recover from that, but was not easy.
@pb46102 жыл бұрын
It would be interesting if LTT did an interview with Darren Kitchen or Shannon Morse on their products.
@pedraoherminio2 жыл бұрын
10:40 Remember kids safety first
@mrbotytgaming8 ай бұрын
😂
@dhaivathlal48702 жыл бұрын
Very excited and happy to see Linus mentioning Darren Kitchen, two of my first and most favourite youtubers. There are a ton of other hardware based hacking devices from Hak5, we would really like to see those to be featured in LTT as well.
@Teshi392 жыл бұрын
0:29 i love how that website is considered cyber crime
@IngwiePhoenix_nb2 жыл бұрын
Using this as a means to automate bench setup is pretty ingenious. Been subbed to the Hack5 channel for a while and totally love what they did there! It's a research tool in one hand, or a weapon in another. Great video!
@TheJCEguy2 жыл бұрын
Coltons Reaction was F***ing priceless even if it was staged XD 🤣
@Neoxon6192 жыл бұрын
Damn, there’s even a USB-C version. Nobody is safe.
@purplelord85312 жыл бұрын
small nitpick by a cs academic (student): documentation is NOT for novices. It is good practice, and every trustworthy community/library/repo should be well documented
@RIPOSTgaming Жыл бұрын
I made one of these with a cheap raspberry pi Pico and it works amazingly, and it is extremely easy to use, they are really help full when trying to code or set up something on multiple computers because it automates it.
@jamerperson2 жыл бұрын
Props to the Hak5 team. Great group of people
@twertygo2 жыл бұрын
Great video! Though you should have shown the Ducky as several different looking USB sticks. A novice might only watch out for a stick that looks like the one you are showing. And it seems to me like you are trying to communicate to novices too. Otherwise I have nothing to complain about and found the video very well written and informative.
@Streichholztasche2 жыл бұрын
Fun facts: The clip in the beginning ( 0:09 - 0:18 ) was a TV-Ad that was actually shown in the early 2000s in germany. The conclusion „So wach warst du noch nie“ at the end means something like „You have never been more awake than now“ and advertised a coffee drink with high caffeine content. There were many complaints due to horrified children and dropouts of pacemakers because of this ads.
@JCR49902 жыл бұрын
Most people have absolutely no idea how scary these things are lol. I ordered one a few years ago to play around with. I don't use it much but I still carry it around with me in my laptop bag. The first day I had it I managed to build a payload that when plugged in within a few seconds would grab every single one of my saved Google chrome passwords and email it to myself. My jaw hit the floor when that email came in with my entire password list in it lol. From that point forward I pretty much NEVER walk away from my laptop at work without locking it. It's insane how much damage someone can do with one of these and a little know-how and 5 seconds of access to a USB slot on your device.
@JCR49902 жыл бұрын
Not to mention something like sudo rm -rf /* lol. See ya later data. Hope u had backups.
@NEOREV_MUSIC2 жыл бұрын
Mr. Robot is such a great show. One of the few series that stuck the landing. With a name like Mr. Robot, the show is not at all what you think it is.
@MRJMXHD2 жыл бұрын
I found it hard to watch due to it's slow pacing. Might just go back.
@sfwreaths12 жыл бұрын
What it is?
@NEOREV_MUSIC2 жыл бұрын
@@MRJMXHD Slow? Really? I loved it. It really takes off season 3 and 4. Stick with it because it all comes together. This show has some of the best directed episodes I've seen on television. The first season is a bit smaller in scope, but becomes a much bigger story as it goes along.
@NEOREV_MUSIC2 жыл бұрын
@@MRJMXHD The whole series is on Prime now.
@MRJMXHD2 жыл бұрын
@@NEOREV_MUSIC thanks I will.
@jeremyellmer39252 жыл бұрын
I almost bought one of these a long time ago. Then I realized you can do the exact same thing with a $5 arduino board. The script language is a little more complex but gives you wayyyyy more features, plus you can add other devices to the arduino like wifi, bluetooth, even capacitors to make your own badUSB. You can go even further and buy "fake" arduinos for even cheaper ($2 in bulk) that do the same thing, 3D print a bunch of harmless looking USB shells and then drop them around the city. Not that i've ever done that.....
@vashumashu43592 жыл бұрын
Right all of this information is clear, the rubber ducky was meant for ease-of-use. The hack.5 gang has always been script kiddy friendly. The more we arm the masses, the better awareness we all share.
@goodnight4u2 жыл бұрын
I mean I really hope you never did that. Because that would make you look like a real creepy looser if you did. But you didn’t so that’s not a concern right?
@jeremyellmer3925 Жыл бұрын
@@goodnight4u I definitely didn't but if I had it would of just pinged a server I had setup as a part of a paper I may have done on cyber security for a college class.
@bexhillbob2 жыл бұрын
Hak5's stuff is great. They have some amazing tools.
@akomplissgaming Жыл бұрын
This is probably the best advertisement they could have asked for. I'd bet tens of thousands of people bought it after watching your great promotion.
@JOEBR0NI2 жыл бұрын
Been watching since the earliest of the NCIX days. Great video to let people know about the dangers of things like this. Can't describe how happy I am to see the LTT intro and song making their way back into all the videos. don't know why, just am!
@lilv7282 жыл бұрын
Just realized my passion and finally started pursuing a comp sci degree this semester. And I'm quite proud of myself because I actually understood every single issue you guys listed with the ducky. I love this field haha
@virgil811882 жыл бұрын
Interesting use for automating your PC setup. Have you also tried UiPath process automation?! It can perform way more complicated stuff and it seems easier to setup that this rubber ducky stuff. Nice shoutout to the Konami cheat code, I'm a game dev :D
@henlofren73212 жыл бұрын
Why would anyone use an external device to run a setup script, especially one that is so limited? If you already have access to the computer, just put the payload on a regular flash drive and run it...
@KJ4EZJ2 жыл бұрын
Or Ansible. This is a neat tool but, for businesses, there are much better options for imaging computers and setting up software. Most software can be baked into the ISO image.
@MaxRovensky2 жыл бұрын
You can configure any Arduino to act as a HID device, I had this idea some time ago but ofc there's a consumer product for this already 😃
@Max_Mustermann2 жыл бұрын
Or a Raspberry Pi Zero.
@christopheroliver1482 жыл бұрын
@@Max_Mustermann A Pi Zero could also run a real programming language for the scripting. (Think LuaJIT)
@Max_Mustermann2 жыл бұрын
@@christopheroliver148 Yes, It works pretty well with Python for example.
@bmoturtleco2 жыл бұрын
The argument at the end for why duckies should be allowed is kinda funny coming from someone like Linus. A tool in the hands of someone determined to do bad things doesn't negate the right of those trying to do good with the same tool. It's almost as if no matter what, bad guys will always find a way to do bad things regardless of the laws.
@lukepaxson60202 жыл бұрын
This should be a corporate security awareness video, if you trimmed it to arround 5 min and sold use rights to the a company like knowb4 or proofpoint it would reach lots of uninformed would be targets who wouldn't normally see an LTT video. Thanks for your work
@collinst.pierre91062 жыл бұрын
If you don't need the built in storage, I'd recommend a Digispark USB. It just uses Arduino code, and there's programs that translate RD scripts to run on them. Plus they're like 20$ for a 5 pack. I've been using them for automated thin client setup.
@ShaddowWolf2 жыл бұрын
if you find the right deal on Amazon for example you can get them for half of that
@RulzSG2 жыл бұрын
10:27 Good good, now do guns.
@tec43032 жыл бұрын
Wait, but how do we protect ourselves apart from not plugging in usb drives?
@anchorbubba2 жыл бұрын
dont download shady shit lmao, make sure not too donwload optional packages included with installers
@Caleb-qr6lo2 жыл бұрын
1. Need a full prank video using these 2. Do more Hak5 stuff.
@FedericoTrentonGame2 жыл бұрын
This usb stick saved my ass on my first job of manually setting up computers in every classroom, i could plug 2-3 pc at the same time, log in and perform the routine task before lunch break in a single day
@little-wytch2 жыл бұрын
I would love to see you do some in-depth vids on the rest of the Hak5 line. I've actually taken to using my old Mark V Pineapple as my IOT access system in my DMZ which let's me rain hell down on bot-net sweeps and the occasional budding hacker that war-drives by for crits and giggles lol.
@bro9182 жыл бұрын
can u translate those words
@christopherjc542 жыл бұрын
@@bro918 he use hacky tools to fight the big bad corporations
@Heeby-Jeebies2 жыл бұрын
These things have SUCH a reputation for abuse, I actually didn't know what the original intended function was.
@CommodoreFan642 жыл бұрын
Linus said in the video it was to automate software installs as a system admin, insert the key into a Windows machine, and let it do it thing, while you walk away to work on something else without having to babysit a single machine for say 10 different pieces of software to install.
@MightyElemental2 жыл бұрын
I'm very surprised the ducky doesn't just use an existing language
@shalokshalom2 жыл бұрын
Might be because of the way it works. It sends signals, as a keyboard. The way you can program this, could be limiting.
@MightyElemental2 жыл бұрын
@@shalokshalom Yeah... But they very easily could make a library for another language that handles all the timings and things. Creating a whole new language seems a bit far.
@MightyElemental2 жыл бұрын
@Ian Visser that's not quite what I meant. I understand what this device does, but I don't see why a new language was required when a different language with a library would have sufficed. Sure it simplifies the scripting I guess, but it still seems like a lot of trouble rather than making a library.
@TheRealSpaceCommander2 жыл бұрын
Well now i know what to get my friend for his birthday next month. This is gonna be fun.
@Felttipfuzzywuzzyflyguy Жыл бұрын
Thank you for covering this! I know this is the newest release which is awesome!
@pixelagent0072 жыл бұрын
This is actually why a lot of businesses will prevent you from plugging in any keyboard except the "certified" ones. I think Active Directory even has a feature for that
@GulfCoastGrit2 жыл бұрын
We actually still configure all of our work machines with PS/2 ports and you can only connect a keyboard to that port. It’s an annoyance but they was the strategy they decided to go with.
@eduardobarreto55552 жыл бұрын
@@GulfCoastGrit I wonder if there could be wireless PS/2 keyboard transceivers. After all, as far as the computer is concerned wireless USB peripherals are identical to wired ones.
@Jack-SecITGuy2 жыл бұрын
PLEASE do the OMG Cable and the Flipper Zero!!!
@tijl80902 жыл бұрын
Please more anthony and less everyone else??
@evinh1112 жыл бұрын
You should check out Hak5's "OMG Cable" - it's a spoof Lightning cable that actually has malicious capabilities too.
@LOLNATIONCH2 жыл бұрын
My university end of bachelor program was making a program to detect unknown peripherals and checking if they were trying to do a payload. We used a rubber ducky for showcase. :D Brings back the memories.
@Sillimant_2 жыл бұрын
Unlike other crime, this is the one that you can stop yourself falling for. NEVER plug in a USB that isn't yours
@dial-upking2 жыл бұрын
One time back in middle school my cousin found a flash drive on the school bus. This was well before I even knew what "computer security" meant. We plugged it into a PC to see what was on it. Luckily it didn't do anything. It was just FULL of prawn. Lots and lots of really hardcore prawn. We erased the drive and I gave it back to him and we never mentioned it to anyone.
@Sevent772 жыл бұрын
Generally don't stick random USB devices into your PC, USB killers are a thing and as the name imply they can kill your PC.
@edtechy_2 жыл бұрын
OMG, Hak5! One of the OG video content creators out there. They're like older or the same age as KZbin. Used to watch them in Revision3 back in the day.
@dreamonline19962 жыл бұрын
I worked for DSM at a local industrial site before our buy out and when I tell you that our classes RAMPED up and they locked our machines. We weren’t allowed to use anything in the machines unless it was provided by our it team.
@matthewjalovick2 жыл бұрын
Be right back, pre-ordering my RubberDucky… I mean… uhh for the purpose of setting up my printer… of course 😬
@super9mega2 жыл бұрын
Never, EVER plug any flashdrive you find on the ground ever. Who knows what might be on it. Or what device it might emulate
@ScottCalvinsClause2 жыл бұрын
I always do! To be fair, I have an extra shitty computer that is connected to nothing and am not a afraid of losing anything on it. I'm not about to let some e-waste go to waste.
@ScottCalvinsClause2 жыл бұрын
Also I pop them open first to check for caps
@Siegefya2 жыл бұрын
I had a college teacher do that to USB stick I left in his class. It was basically empty with just a couple photos on it from when I was in the military I kept it around as a backup, and it fell out of my backpack...dude literally just plugged it into his computer to find out what student left it in his class. He found it and gave it back to me and told me "be careful you wouldn't want to lose one of those with important information on it". This professor was the schools lead as far as like...tech classes. He pretty much ran the IT department..this was at a community college.
@squishysam2 жыл бұрын
@@ScottCalvinsClause what do you mean by "checking for caps"?