Skip to content

All the details and steps needed to perform tactical mousejacking using Autojack

Notifications You must be signed in to change notification settings

SecurityWard/MouseJack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

MouseJack

All the details and steps needed to perform mousejacking with or without Autojack.

Mousejacking is class vulnerabilies that was discovered in 2016 by researchers at Bastille. Mousejacking is an often over looked method of gaining a foothold in a network. All the specifics about the findings including a technical write up can be found at Bastilles website. https://www.bastille.net/research/vulnerabilities/mousejack/

In order to exploit these vulnerabilities you will need to acquire a Crazyradio PA dongle https://store.bitcraze.io/products/crazyradio-pa

Then you will need to re-flash the dongle firmware using the tools provided by Bastille and following the directions they provide here. https://github.com/BastilleResearch/mousejack

Once the dongle has been flashed you can use the tool "Jackit" to begin scanning for vulnerable devices and injecting rogue keystrokes into your targets. https://github.com/insecurityofthings/jackit#how

Jackit injection is done using classic Ducky Script. Details on how to use Ducky Script can be found here https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Duckyscript

Once everything is configured you can automate the scanning and injection process by running AutoJack, making sure the payload path and file match yours.

There seems to be an issue on ARM devices where the USB dongle gets hung, preventing successive scans. To fix this without having to physically remove the dongle I created the USBreset script. Autojack takes care of scanning, injecting the payload on all targets, and then resetting the USB, all without user interaction.

NOTE: there are some drawbacks to this type of attack. Keystrokes can get lost, mistyped, or stuck causing payloads to incorrectly execute. The target will see keystrokes being typed on their device which could cause suspicion.

About

All the details and steps needed to perform tactical mousejacking using Autojack

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published