mirror of
https://github.com/UberGuidoZ/Flipper.git
synced 2024-12-23 06:50:12 +00:00
89 lines
5.9 KiB
Markdown
89 lines
5.9 KiB
Markdown
<!DOCTYPE html>
|
|
<html lang="en">
|
|
<head>
|
|
<meta name="viewport" content="width=device-width, initial-scale=1">
|
|
<meta name="description" content="dedicated to penetration testing and security assessments using Ducky scripts. It provides information, resources, and tools related to executing security tests and evaluating system vulnerabilities.">
|
|
<meta name="author" content="NarstyBits flipperzero badusb payloads">
|
|
<!-- Open Graph tags -->
|
|
<meta property="og:title" content="MacOS-DuckyScripts">
|
|
<meta property="og:description" content="BadUSB scripts exclusively designed for Mac OS & the Flipper Zero device.">
|
|
<meta property="og:image" content="https://imgur.com/MfuJBOZ.png">
|
|
<meta property="og:url" content="https://github.com/narstybits/MacOS-DuckyScripts/blob/main/Executions%20Readme.md">
|
|
<meta charset="utf-8>
|
|
</head>
|
|
<body>
|
|
|
|
[![Image Description](https://imgur.com/MfuJBOZ.png)](https://github.com/narstybits/MacOS-DuckyScripts/tree/main/Executions)
|
|
|
|
<div align="left">
|
|
<img alt="Coding" width="1473" height="18" src="https://media.giphy.com/media/9JxkPTP3alOykb8PmQ/giphy.gif">
|
|
</div>
|
|
|
|
<h3 align="center">
|
|
<p>Welcome to the Executions Folder!</p>
|
|
|
|
<h>The <a href="https://github.com/narstybits/MacOS-DuckyScripts/tree/main/Executions">Executions Folder</a> is dedicated to penetration testing and security assessments using Ducky scripts. It provides information, resources, and tools related to executing security tests and evaluating system vulnerabilities.</p>
|
|
</h4>
|
|
|
|
<h2> Introduction
|
|
<div align="center">
|
|
<img alt="Coding" width="1473" height="5" src="https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif">
|
|
</div>
|
|
<h4>Penetration testing, also known as ethical hacking, is a process of evaluating the security of a system or network by simulating real-world attacks. This section aims to guide you through the process of executing security tests using Ducky scripts.</p>
|
|
|
|
<h2>Types of Executions
|
|
<div align="center">
|
|
<img alt="Coding" width="1473" height="5" src="https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif">
|
|
</div>
|
|
<h4>
|
|
<copy>
|
|
<ol>
|
|
<li>Load Testing: This tests how well a system can handle heavy traffic or data processing. It helps find weak points in the system's performance.</li>
|
|
<li>Data Exfiltration to Dropbox or iPhone: This involves taking data from a target system and uploading it to a Dropbox account or sending it to an iPhone. This can be used to steal information or disrupt the target's operations.</li>
|
|
<li>Personal Information Gathering: This involves finding personal details about a target. These details can be used to gain unauthorized access to systems or for identity theft.</li>
|
|
<li>Remote Shell: This involves gaining control of a target system's command line from a remote location. This allows an attacker to execute commands and manipulate the system without being physically present.</li>
|
|
<li>System Disruption: This involves causing problems for a target system, like making it unavailable or causing it to malfunction.</li>
|
|
<li>System Destruction: This is a severe attack that causes permanent damage to a target system, like deleting important files or damaging hardware.</li>
|
|
</ol>
|
|
</copy>
|
|
</h4>
|
|
|
|
<h2> Tools
|
|
<div align="center">
|
|
<img alt="Coding" width="1473" height="5" src="https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif">
|
|
</div>
|
|
<h4>
|
|
<ul>
|
|
<p>These are just a few examples of tools used for executing security tests. Remember to always use these tools responsibly and in accordance with applicable laws and regulations.</p>
|
|
<p><span style="font-size: 0;"></span>🔹<a href="https://ffmpeg.org/">FFmpeg</a>: A powerful multimedia framework for encoding, decoding, transcoding, and streaming audio and video files.</li>
|
|
<p><span style="font-size: 0;"></span>🔹<a href="https://cat.pdx.edu/platforms/mac/remote-access/remote-to-mac/">VNC (Virtual Network Computing)</a>: A remote desktop software that allows you to control and access remote systems over a network.</li>
|
|
<p><span style="font-size: 0;"></span>🔹<a href="https://linux.die.net/man/1/socat">socat</a>: A versatile network utility that establishes bidirectional data streams between two endpoints, facilitating various network operations.</li>
|
|
<p><span style="font-size: 0;"></span>🔹<a href="https://cirt.net/Nikto2">Nikto</a>: A web server scanner that performs comprehensive vulnerability assessments.</li>
|
|
<p><span style="font-size: 0;"></span>🔹<a href="https://github.com/OJ/gobuster">Gobuster</a>: A tool used for directory and DNS busting during reconnaissance.</li>
|
|
<p><span style="font-size: 0;"></span>🔹<a href="https://nmap.org/">Nmap</a>: A powerful network scanning tool used for port scanning and network mapping.</li>
|
|
</ul>
|
|
</h5>
|
|
|
|
|
|
|
|
<h2> Resources
|
|
<div align="center">
|
|
<img alt="Coding" width="1473" height="5" src="https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif">
|
|
</div>
|
|
<h3>Here are some additional resources to learn more about penetration testing/executions and Ducky scripting:</p>
|
|
|
|
<h4>
|
|
<ul>
|
|
<p><span style="font-size: 0;"></span>🔹<a href="https://www.ducktoolkit.com/">Duck Toolkit</a>: A more comprehensive guide on using Hak5's Rubber Ducky, including how to write and decode Ducky Scripts.</p>
|
|
<p><span style="font-size: 0;"></span>🔹<a href="https://www.guru99.com/load-testing-tutorial.html">Guru99's Load Testing Tutorial</a>: An extensive tutorial that covers the principles and practical aspects of load testing, an essential part of assessing the performance and stability of a system under a particular load.</p>
|
|
<p><span style="font-size: 0;"></span>🔹<a href="https://www.dropbox.com/developers/documentation/http/documentation">Dropbox API Keys Documentation</a>: Comprehensive developer documentation from Dropbox, including detailed instructions on how to generate and manage API keys for application development.</p>
|
|
</ul>
|
|
</h4>
|
|
|
|
|
|
|
|
<div align="center">
|
|
<img alt="Coding" width="1473" height="5" src="https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif">
|
|
</div>
|
|
</body>
|