Ducky1
2023-05-22
Ducky1
- Category: Rev
- Difficulty: Easy
- Points: 100
- Solves: 185
Description
I recently got ahold of a Rubber Ducky, and have started automating ALL of my work tasks with it! You should check it out!
Files
inject.bin
- data
Solve
The contents of inject.bin
dosn’t give us much information.
$ xxd inject.bin
00000000: 00ff 00ff 00ff 00ff 00ff 00ff 00ff 00ff ................
...
00000350: 00ff 00ff 00ff 00ff 00ff 00ff 00ff 005f ..............._
00000360: 0500 1c00 1800 0600 1700 0900 2f02 1700 ............/...
00000370: 0b00 0c00 1600 2d02 1a00 0400 1600 2d02 ......-.......-.
00000380: 0d00 1800 1600 1700 2d02 0400 1100 2d02 ........-.....-.
00000390: 0c00 1100 1700 1500 1200 2d02 0400 0f00 ..........-.....
000003a0: 1500 0c00 0a00 0b00 1700 3802 3802 3002 ..........8.8.0.
The description tells us that this file is a “Rubber Ducky”, and resarching this tells us that a Rubber Ducky is keyboard device that appears like a USB drive and sends a keystroke payload when pluged into a computer. Further research shows some tools that can be used to encode and decode these rubber ducky payloads, such as DuckToolkit. Using Ducktoolkit we can decode inject.bin
.
$ python3 ducktools.py -d -l us ../inject.bin /dev/stdout
[+] Reading Duck Bin file
[-] Decoding file
[-] Writing ducky text to /dev/stdout
DELAY
byuctf{this_was_just_an_intro_alright??}[+] Process Complete
After decoding we get the flag.
byuctf{this_was_just_an_intro_alright??}