Skip to content
  • 8 800 799 99 99
  • Store in St. Petersburg
    Store Name
    St. Petersburg, Nevsky Prospect 28
    Daily 10:00–22:00
    contacts
  • Daily 10:00–22:00
  • Stores
  • Country
DEV - 5
  • All Collections
    • Swimwear
  • All Products
  • Blog
    • News
  • Contact us
  • Log In
  • Create account
0
8 800 799 99 99
St. Petersburg, Nevsky Prospect 28
Daily 10:00–22:00
  • Catalog
    • Laptops & Tablets
    • Phones & Gadgets
    • TV & Video
    • Games & Entertainment
    • Photo
    • see all categories
  • Brands
    • Apple
    • Samsung
    • Sony
    • Microsoft
    • Intel
    • HP
    • LG
    • Lenovo
    • ASUS
    • Acer
    • Dell
    • Canon
    • see all brands
  • Pages
    • Catalog
    • Category
    • Subcategory
    • Cart
    • Account
    • About
    • Contacts
    • Blog
    • Article
    • FAQ
    • Delivery
  • Blog
  • About
  • Contacts
  • Stores
  • Country
  • facebook
  • twitter
  • pinterest
  • instagram
  • tumblr
  • youTube
  • vimeo,
  • Home
  • Blog

Blog

LAN TURTLE 102 - THE TURTLE SHELL AND TURTLE MODULES
April 23, 2019

LAN TURTLE 102 - THE TURTLE SHELL AND TURTLE MODULES

LAN TURTLE 101 - FIRST BOOT AND SOFTWARE UPDATE
April 23, 2019

LAN TURTLE 101 - FIRST BOOT AND SOFTWARE UPDATE

LAN TURTLE 103 - METASPLOIT AND LAN TURTLE WITH METERPRETER
April 23, 2019

LAN TURTLE 103 - METASPLOIT AND LAN TURTLE WITH METERPRETER

THE 3 SECOND REVERSE SHELL WITH A USB RUBBER DUCKY
April 22, 2019

THE 3 SECOND REVERSE SHELL WITH A USB RUBBER DUCKY

In this tutorial we’ll be setting up a Reverse Shell payload on the USB Rubber Ducky that’ll execute in just 3 seconds. A reverse shell is a type of shell where the victim computer calls back to an attacker’s computer. The attacking computer typically listens on a specific port. When it receives the connection it is then able to execute commands on the victim computer. In essence it’s remote control of a computer.

STEALING FILES WITH THE USB RUBBER DUCKY – USB EXFILTRATION EXPLAINED
April 22, 2019

STEALING FILES WITH THE USB RUBBER DUCKY – USB EXFILTRATION EXPLAINED

As a keystroke injection attack tool capable of mimicking both a USB keyboard and mass storage, the USB Rubber Ducky excels at autonomously exfiltrating documents – or what we like to call performing an involuntary backup. In this article I will briefly outline the steps necessary to turn your USB Rubber Ducky into a document exfiltration machine, as described on Hak5 episodes 2112, 2113 and 2114.

  • About
  • Contacts
  • News
  • FAQ
  • Delivery
  • 1
  • 2
  • 3
DEV - 5

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed ut mauris eros. Nulla quis ante sed tortor efficitur facilisis.

  • facebook
  • twitter
  • pinterest
  • instagram
  • tumblr
  • youTube
  • vimeo,
  • Catalog
  • Brands
  • Delivery
  • FAQ
  • About
  • Contacts
  • Blog
  • News
  • All Reviews
  • Privacy Policy
  • Refund Policy
  • Shipping Policy
  • Terms of Service
Welcome to join us in this big family.