The summary of ‘bad USBs are SCARY!! (build one with a Raspberry Pi Pico for $8)’

This summary of the video was created by an AI. It might contain some inaccuracies.

00:00:0000:21:04

The video centers around the concept of "bad USB" devices that masquerade as Human Interface Devices (HIDs) to perform malicious actions on computers. It demonstrates creating and using such devices using USB Rubber Ducky from Hack Five and Raspberry Pi Pico. The video explains how these bad USBs can disable security software, open reverse shells, and even play tricks like Rickrolling by simulating keyboard inputs. It emphasizes the danger these devices pose as they can quickly execute commands before detection.

Key points include differentiating between USB storage devices and HIDs, setting up a Raspberry Pi Pico with CircuitPython to act as a bad USB, and using the Duckyscript language created by Darren Kitchen of Hack Five to automate actions. The video also discusses security implications and protective measures, like using Dashlane for password management, avoiding unknown USB devices, locking computers, enabling password authentication for administrative tasks, and making registry changes to enhance security. Finally, it mentions physical protection of USB ports and concludes with a giveaway contest for USB Rubber Duckies.

00:00:00

In this part of the video, the presenter introduces a device that looks like a normal USB flash drive but is actually a “bad USB,” specifically designed for hacking. The presenter demonstrates the device’s capabilities by plugging it into a computer, showing how it can disable Windows Defender and open a reverse shell without any manual intervention. This bad USB can also play pranks, such as an unstoppable Rick Astley song. The video suggests using either a USB Rubber Ducky from Hack Five, priced at around $45, or a Raspberry Pi Pico, which costs about $5, to create a bad USB. The presenter also mentions a giveaway of USB Rubber Duckies and promises to explain both how the device works and how to defend against such attacks later in the video. The key feature of the bad USB is that it masquerades as a keyboard (HID device) rather than a storage device, making it particularly dangerous.

00:03:00

In this segment of the video, the presenter discusses the differences between USB master storage devices and Human Interface Devices (HID). A USB master storage device appears in the file manager and allows data transfer, while a USB rubber ducky (bad USB) masquerades as an HID, making it appear as a trusted keyboard or mouse. This is dangerous because the computer inherently trusts HID devices, and these devices can type much faster than humans, executing malicious commands quickly before detection.

The presenter highlights the threat posed by malicious USB devices left in public spaces, which curious individuals might plug into their computers, unknowingly compromising their systems. The segment then transitions into a tutorial on setting up a Raspberry Pi Pico as a bad USB using a project from GitHub called Pico Ducky. The presenter details the steps to download and install CircuitPython on the Pico, transforming it into a device that can execute scripts like a USB rubber ducky.

00:06:00

In this part of the video, the presenter demonstrates how to set up a Raspberry Pi Pico with CircuitPython to emulate a keyboard or mouse using the HID library. The steps include downloading the Adafruit CircuitPython bundle from GitHub, extracting the HID library, and transferring it to the Raspberry Pi Pico’s lib folder. The presenter also explains how to replace the default `code.py` script with a custom USB Rubber Ducky script (`ducky in python.py`) to automate various actions such as Rick Rolling or performing a reverse shell. The segment transitions into discussing the security implications and potential uses of this setup, such as password stealing, with a mention of the sponsor, Dashlane, a password manager.

00:09:00

In this segment of the video, the speaker discusses the functionalities and benefits of using Dashlane, a password manager. Dashlane ensures regular password changes, scans the dark web for compromised passwords, and supports two-factor authentication across various devices. The speaker highly recommends Dashlane for securing passwords and simplifying online purchases.

The video then transitions to a tutorial on setting up a “rickroll” Bad USB attack using a USB Rubber Ducky. The speaker introduces a resource on GitHub containing numerous Rubber Ducky scripts, such as one that disables Windows Defender. He explains that Duckyscript, created by Darren Kitchen of Hack Five, simulates keyboard actions through simple commands. The tutorial walks through the process of preparing the USB Rubber Ducky by loading a script onto a micro SD card and inserting it into the USB device.

00:12:00

In this segment of the video, the speaker demonstrates how to utilize a “rubber ducky” script by first prepping and encoding it. The process involves using a GUI tool embedded in an HTML file to encode the script. The script is pasted into the script editor, and a payload is generated, named inject.bin, which is then copied to a USB rubber ducky. For a Raspberry Pi Pico, encoding isn’t needed. Instead, the script is saved as payload.dd in a text editor and copied directly to the Raspberry Pi Pico, cautioning that the script runs immediately upon plugging in. The speaker highlights the Raspberry Pi Pico’s ease-of-use and low cost while noting it automatically executes scripts on connection, potentially requiring a factory reset to edit scripts.

00:15:00

In this part of the video, the presenter explains how to use a script named “flash_nuke” to completely reset a Raspberry Pi Pico by erasing all its contents, including CircuitPython. The segment highlights the dangers of using potentially harmful USB devices like USB Rubber Ducky and Raspberry Pi Pico, which can mimic keyboard and mouse inputs to perform malicious actions on various operating systems. The presenter stresses the importance of not plugging in unknown USB devices, as they could install malware or steal data. Additionally, they advise always locking your computer when unattended to prevent unauthorized access. The video also suggests enabling password authentication for administrative tasks to add an extra layer of security, particularly for system administrators managing company devices.

00:18:00

In this part of the video, the speaker discusses how to make registry changes to enhance security on a computer. They warn about the dangers of editing the registry without proper knowledge but provide a step-by-step guide to change the “consent prompt behavior admin” setting to require a password. This strengthens security by ensuring that administrative actions cannot be performed with just a yes/no prompt. Additionally, they suggest implementing group policies and following best practices to limit administrative access for users. The speaker also mentions physical methods to protect USB ports, such as locking or disabling them, though acknowledging the inconvenience this may cause. Finally, they highlight the effectiveness and fun of using USB Rubber Ducky devices and offer a giveaway contest for viewers.

Scroll to Top