Keystroke Injection

Keystroke injection is accomplished by masking a HID (human interface device) such as a mouse, keyboard or jump drive that can execute keystrokes upon insertion. The very idea of this attack is cleaver as the possibility of detection can be low and a very viable solution for bridging air gaps ( a computer or network physically isolated from internet or other networks).

While there are many devices to choose from, I picked up a cheap Arduino pro micro knock off to play with called the Keystudio Pro Micro 32u4. These are cheap and readily available everywhere.

To get started, I read a bit on the keyboard.h library and some of the modifiers while trying devise a quick and dirty attack plan.To me this is one of the most exciting things about Pentesting and security research; visualization of the plan, reconnaissance and establishing viable execution. 

Playing with some simple inputs and delays with keyboard shortcut combinations lead to some interesting use cases allowing PowerShell commands to be executed. 

To increase the functionality of this device buttons could be added to cycle prescipted payloads, and adding an SSD to possibly store text dumps would be beneficial.

No comments:

Post a Comment

My Experience

  • __

  • March 2021 - Present

    Technical Consultant

    • Offering recommendations on Networking and Server requirments for prospecting customers
    • Providing technical support on installation and training
  • March 2020 - March 2021

    Currently open to opportunities!

  • 2016 - March 2020

    IT/HSE Coordinator

    • Providing effective troubleshooting solutions involving printers, desktops and mobile devices - maintaining connectivity, end user satisfaction and functionality
    • Composing various documentation providing training in I.T, HSE and standard operating procedures as to ISO 9001:2015 standardization
  • 2018 - 2019

    Network Administrator Diploma, triOS College

  • 2008 - Present (.part time)

    IT Support Specialist

    • Build and support specialized workstations and gaming pc’s, providing cost effective solutions based on customers expectations and requirements
    • Provide on-site, remote and similar managed services through Windows RDS, Quick Assist and TightVNC with secured tunneling
  • __

  • 2012 - 2016

    Technical Advisor

    • Research, design and prototype various engineered specifications utilizing additive manufacturing to iterate design concepts, potential flaws and plausibility
    • Troubleshoot PLC’s, maintaining and developing various process controls with pneumatic and hydraulic circuits
  • 2011 - 2012

    Demanufacturing Technician

    • Provide technical documentation on the identification, safety precautions and dismantling procedures of desktops, servers, monitors and televisions
    • Identify and categorize desktops, server and networking equipment for potential resale
  • 2006-2011

    IT Support Specialist

    • Compiled prospects of our search engine optimization to restore and maintain online presence resulting in streamlined control and analysis of our ranking,
    • Install horizontal runs providing clean and structuralized cable management
    • Perform scheduled backups creating archival storage of sensitive data