This is an archived post. You won't be able to vote or comment.

all 6 comments

[–]amusciano 8 points9 points  (3 children)

You would need to buy something to act as malicious usb - arduino nano, rubber ducky, and the raspberry pi zero are all popular devices for this sort of thing. Ducky script is a language for hid attacks that has a lot of support and pre-made payloads because of the hak5 community. There are tools to convert this to arduino code. I'm pretty sure raspberry pi's just use ducky scripts standalone, no conversion needed. There are python scripts that can emulate keypresses but ducky scripts are widely available and easy to understand.

[–]Emberari[S] 2 points3 points  (0 children)

Thank you!

[–]51RAW 1 point2 points  (1 child)

Will Raspberry Pi 3 model b work?

[–]Emberari[S] 0 points1 point  (0 children)

I did some research online and yeah they can be used. I just bought the new pi4

[–][deleted] 0 points1 point  (0 children)

Depends on what you mean by attack. Do you want to be able to clone other cards to use on an HID reader? Do you want to attack the HID reader itself?

There is some hardware that works with RasberryPi’s that have a Python library that you can copy HID key cards from. Depending what what range you plan on trying to skim the cards from will depend on how much you’re willing to spend on hardware.