Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
hak5
GitHub Repository: hak5/usbrubberducky-payloads
Path: blob/master/payloads/library/exfiltration/NTLM_ducky/README.md
2968 views

Exfiltrate NTLM Hash - Windows ✅

A Rubber Ducky payload to exfiltrate NTLM hash files from a Windows machine onto the SD card.

Description

This payload script captures and exfiltrates NTLM hash files from a Windows machine. It uses PowerShell commands to locate and save the SAM and SYSTEM files, which contain hashed user passwords, onto the Rubber Ducky's SD card for later extraction and analysis. Upon successful file extraction, the payload triggers a visual confirmation by blinking the Caps Lock LED

Settings

  • Drive Label: Set the target drive label for Rubber Ducky storage (default: DUCKY).

  • Blink Count: Adjust the number of Caps Lock LED blinks by setting the #numBlinks variable (default is 9 blinks).

Credits

Luu176


GitHub