ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!
Home
Upgrade
Credits
Help
Search
Awards
Achievements
 1190

What is HID? | Hardware tools for HID attacks

by Firefly21 - 08-14-2023 - 05:35 PM
#1
What is HID?

HID (Human Interface Device). HIDs are devices that allow other devices, such as computers, smartphones, and televisions, to receive information from them. Examples of HIDs include keyboards, mice, joysticks, touch panels, and Android devices equipped with NetHunter.

This means that when our Android device is connected to a computer, it can be recognized as a keyboard. But not just an ordinary keyboard; it can function as a keyboard with predefined keystrokes. It can be programmed to inject keystrokes into a computer as if they were being typed on a physical keyboard. This capability allows it to execute a predetermined sequence of actions on the host device.

In addition to Android, there are other devices that are used to perform HID attacks. These are commonly referred to as Rubber Ducky or BadUSB devices.


Hardware tools for HID attacks:
  • Rubber Ducky: A Rubber Ducky is a small programmable USB device that resembles a USB flash drive. It can be programmed to inject keystrokes into a computer, simulating keyboard inputs. This allows it to perform a predefined set of actions on the target device.
  • Teensy: Teensy is a compact, programmable microcontroller that can be configured to act as an HID device. It is capable of injecting keystrokes and other inputs into a host device.
  • Bash Bunny: is a programmable USB device designed for various types of attacks, including HID attacks. It can be programmed to inject keystrokes and other inputs into a target device, or execute scripts and commands.
  • Raspberry Pi: is a small single-board computer that can execute a variety of attacks, including HID attacks. It can be programmed to act as a HID device, injecting keystrokes and other inputs into a target device.
  • Digispark Attiny85 Arduino: is an affordable, programmable microcontroller suitable for performing a variety of attacks, including HID attacks. It can be programmed to behave like a HID device and inject keystrokes or other inputs into a host device.
I hope you find this information useful :-)
Reply

Users browsing: 2 Guest(s)