Specific Ducky

MediumDigital Forensics

Overview

Some employee found a USB in the parking lot and plugged it into his working PC. From that, it ran some weird code, but it didn't do much for some reason. Can you find the domain that it tried to contact? Flag format: flag{*****************.******.**}

Lab Details

Prerequisites & Requirements

  • Protocol Analysis: Proficiency with Wireshark, specifically filtering URB (USB Request Block) traffic and HID report descriptors.
  • USB HID Specifications: Fundamental understanding of usage pages and how keyboard scan codes are mapped to characters.
  • PowerShell Analysis: Ability to deobfuscate and refactor scripts utilizing bxor and system-level environment variables.
  • Environmental Keying: Understanding how malware uses system metadata (like Keyboard Layout IDs) as cryptographic seeds to evade sandboxes.

What will you learn?

  • HID Forensics: Programmatically extracting and parsing raw USB interrupt data to reconstruct attacker keystrokes.
  • Keystroke Injection Analysis: Identifying "Rubber Ducky" style attacks and recovering the automated payloads they inject.
  • Cryptographic Recovery: Identifying logical errors in PowerShell scripts and performing a dictionary-based brute-force attack against LCIDs (Locale IDs).
  • C2 Discovery: Recovering hidden Command and Control (C2) domains from encrypted stage-1 payloads.

Tools

  • Forensics: Wireshark (USBPcap)
  • Automation: Python (with pyshark for automated packet parsing)
  • Reference: Microsoft MSDN (Keyboard Layout and HID Usage tables)

Job Positions

Digital Forensics Analyst

Tags

WiresharkPacket CaptureNetwork ForensicsUsb Device HistoryOs Artifacts