Team M30W
Faking classes -> Faking device
ssh pi -> keyboard signal -> victim
Victim
Attacker
Generate Payload
Relay Payload
Pi
insert pi -> keyboard signal -> wget trojan
Victim
wget
Victim
Server
Client
Connect
Control
However
Not only a keyboard,
but also a USB storage!
Use cmd to move our file from USB storage to victim
-> execute as routine startup
insert pi -> & act as USB & Keyboard ->
Move trojan from USB
Victim
copy
Victim
Server
Client
Connect
Control
Victim
Our Server
Connect
Victim
?
Screen
Eavesdrop your keyboard & window!
Upload to trusted server, like youtube stream
Victim
tlk.io
send key
Meow
peep key