Thank you sir thanks a lot for your great contribution to the free education content of cyber security I am here with you and gonna watch all your upcoming and recent videos.
How do you stop the payload from continuing tho? how would we stop the caps lock from happening? is there a timer of how long the payload runs before it shuts down or somert?
This would be a great troll on someone trying to type a password. I know, all of you use Keypass or something similar to aggregate your passwords, but I'm kinda old school.
Not to mention only allowing signed powershell script so it might not run anyway. Might not be able to use a script and use keystroke injections instead is preferred for that reason.
@@geroffmilan3328 yes you are right but it is called defense in depth. It is one part of the many process that should be implemented and as this current payload stands it will not get around the powershell execution policy. EDR is more than likely going to pick up your techniques anyway. They have gotten pretty good at that.
I'm not sure why this script persistently creates a New-Object every 2 lines - the one it made first time around hasn't gone anywhere if this is all 1 script or session?
And what, you believe NASA & the Chinese are *co-operating* to hide the flat earth from us all? How's JFK Junior doing, & ya wanna buy this bridge off me? Need a quick sale
Great to see you back Darren. I always enjoy your enthusiasm.
Finally! Darren is back! What happened to van life?????
Thank you sir thanks a lot for your great contribution to the free education content of cyber security I am here with you and gonna watch all your upcoming and recent videos.
Glad to see Darren back, will be a regular viewer again
Very cool payload to troll friends, but then how do you remove it?
How do you stop the payload from continuing tho? how would we stop the caps lock from happening? is there a timer of how long the payload runs before it shuts down or somert?
Hay Darran, nice to see you back.. I have Question how would one stop this script?
idk
This would be a great troll on someone trying to type a password. I know, all of you use Keypass or something similar to aggregate your passwords, but I'm kinda old school.
Now what would it take so when the caps lock being pressed it will drop a L
All well and good till someone looses an eye! So how does the victim stop it from blinking, is the hidden PS running somewhere visible?
do these work with an older version of rubber ducky ? i bought mine back in 2016
Did you ever find out?
Not to mention only allowing signed powershell script so it might not run anyway. Might not be able to use a script and use keystroke injections instead is preferred for that reason.
So many ways round script signing & execution policy, yet I see almost as many determined fools on reddit who are certain they're useful defences 😁
@@geroffmilan3328 yes you are right but it is called defense in depth. It is one part of the many process that should be implemented and as this current payload stands it will not get around the powershell execution policy. EDR is more than likely going to pick up your techniques anyway. They have gotten pretty good at that.
What's the name of your book
darren is come back 😮 wow great to see you back!!!!
Any telemetry?
I really like the video, very insightful
Damn, this tool can be useful for on a statement of work and Quality Assurance PenTest Report.
I'm not sure why this script persistently creates a New-Object every 2 lines - the one it made first time around hasn't gone anywhere if this is all 1 script or session?
Why was he missing from all the other videos
It bypass windows 10 / 11 defender
His heart is still kickin! 🎉
1st
Lolz
Bwahaha he believes things go to "space" 🤣🤣
Well he said Atlas V but showed a picture of a Falcon 9 so we really can’t trust his space expertise 😉.
And what, you believe NASA & the Chinese are *co-operating* to hide the flat earth from us all?
How's JFK Junior doing, & ya wanna buy this bridge off me? Need a quick sale
This will be so fun lol 😂