Ducky

MediumDigital Forensics

Overview

Some employee found a USB in the parking lot and plugged it into his working PC. From that, we got hacked. Can you find the domain that continued the attack from? Flag format: flag{*******.******.**}

Lab Details

Prerequisites & Requirements

  • Intermediate Wireshark Proficiency: A solid understanding of Wireshark's advanced features, including applying complex display filters, following USB conversations, and interpreting various USB protocol data units.

What will you learn?

  • Analyze USB HID Traffic: Develop skills in examining captured USB Human Interface Device (HID) traffic to identify and interpret emulated keystrokes from devices like Rubber Duckies.
  • Reconstruct Malicious Keystrokes: Learn techniques for extracting and reconstructing command-line inputs and scripts executed by a simulated keyboard device.
  • Identify Attacker Infrastructure: Pinpoint external command and control (C2) domains or IP addresses used by an attacker from the reconstructed traffic.

Tools

  • Wireshark: An indispensable network protocol analyzer for dissecting and interpreting USB packet captures.

Job Positions

Tags

Network ForensicsPacket CaptureWiresharkUsb Device HistoryOs Artifacts