Foundation Level With USB Rubber Ducky Now With Less Than 10
What you'll learn
- What is DigiSpark
- How DigiSpark can be used in Hacking
- Writing your first ethical hacking payload
- Hardware Penetration Testing
- Arduino IDE Basics
- Hacking with (H)uman (I)nterface (D)evices (HID)
Requirements
- Computer running MacOS, Linux, or Windows
- Arduino IDE installed (free)
- Digispark ATTiny85 USB Development Board (~$2 each)
- Useful but not required: Basic knowledge of Arduino IDE & terminal commands
Description
Learn How to Use MicroController in Real-World Hacking Scenario
In this course, I’m going to show you how we can use a tiny 1$ microcontroller to hack any PC on your local network and anywhere in the world using public IP. This Microcontroller is called DigiSpark. It is a microcontroller based on the Attiny85 development board. It is similar to Arduino but smaller and more powerful in terms of hacking.
Installing backdoors, exfiltrating documents, or capturing credentials is incredibly easy with a seemingly innocent USB drive called the USB Rubber Ducky. An Expert hacker with a few minutes, photographic memory, and perfect typing accuracy can use a few well-crafted keystrokes to hack virtually anything they have physical access to. However, the proper hardware can do the same thing every time on demand without fail. That’s where the Rubber Ducky and other Human Interface Devices (HID) come into play. They inject keystrokes at superhuman speeds, violating computers' inherent trust in humans by posing as a keyboard.
In this class, we’ll learn more about what HID attacks are, how they work, the social engineering that can be involved in their deployment, and how to use them in your Pen-testing engagements. Keyboards announce themselves to computers as HID devices and are in turn automatically recognized and accepted. We'll program a microcontroller in Arduino to take advantage of this by acting as an HID device. We can then create scripts that run when the device is plugged into a target computer. All at only a fraction of the cost of the more well-branded USB Rubber Ducky!
Students will learn to use a low-cost Digispark to program their payloads for use in Ethical Hacking and Penetration testing. We'll go over creating more advanced loads, including tracking payloads that run in the background, as well as Rickroll payloads that can be used with permission from friends and family to demonstrate how HID attacks work. Additionally, students learn to automate nearly anything on an unattended device which can be extremely useful when you need to run the same commands on a series of computers. That’s how the Original USB Ruber Ducky was invented. Hak5 founder Darren Kitchen, while working as a sysadmin, got tired of typing the same commands to fix printers and network shares, again and again, and the device evolved out of laziness. He programmed a development board to emulate the typing for him - and thus the keystroke injection attack was born.
هل صناعه جهاز رابر دكي؟
دعنا نتعرف على قطعه الرابر دكي ومحتوياتها وأداءها والجمعونيه دعنا نتعرف على قطعه مثيله بسبب غلاء ثمن شراء قطعه الرابر دكي نتعرف في هذا الكورس تعرف كاملا على محتويات الرابر دكي وقطعها والطرقتها والقطع الممثله لها مختلف الطريق واختلاف الامكانيات وه توصيف مع اجهزه الكمبيوتر لينكس أو ماك أو وندوز اعدك بان لم يتم تقديم هذا الكورس في محتوى محتوى أو مكان عربي على مستوى العالم لي الشرف أن يقدم أول من كورسات في عالم الهاردوير في هذه النقطه بسبب فقر المجال والمرافعة العربي من نوع هذا المحتوى من حيث الرابر دكي و قطع الهاردوير بشكل عام شكرا جزيلا لثقتك شكرا جزيلا لك بالتوفيق تود صناعه جهاز رابر دكي؟
دعنا نتعرف على قطعه الرابر دكي ومحتوياتها البرمجيه والالكترونيه دعنا نتعرف على قطع مثيله بسبب غلاء ثمن شراء قطعه الرابر دكي سوف نتعرف في هذا الكورس تعرف كاملا على محتويات الرابر دكي وقطعها والطرق برمجتها والقطع الممثله لها وال مشابهه لها في اختلاف في الطريق البرمجيه واختلاف الامكانيات و طريقه توصيف مع اجهزه الكمبيوتر لينكس او ماك او وندوز اعدك بان لم يتم تقديم هذا الكورس في اي محتوى او اي مكان عربي على مستوى العالم لي الشرف ان اكون اول من يقدم كورسات في عالم الهاردوير في هذه النقطه بسبب فقر المجال والمحتوى العربي من نوع هذا المحتوى من حيث الرابر دكي و قطع الهاردوير بشكل عام شكرا جزيلا لثقتك شكرا جزيلا لك بالتوفيهل تود صناعه جهاز رابر دكي ؟
دعنا نتعرف على قطعه الرابر دكي ومحتوياتها وأداءها والجمعونيه دعنا نتعرف على قطعه مثيله بسبب غلاء ثمن شراء قطعه الرابر دكي نتعرف في هذا الكورس تعرف كاملا على محتويات الرابر دكي وقطعها والطرقتها والقطع الممثله لها مختلف الطريق واختلاف الامكانيات وه توصيف مع اجهزه الكمبيوتر لينكس أو ماك أو وندوز اعدك بان لم يتم تقديم هذا الكورس في محتوى محتوى أو مكان عربي على مستوى العالم لي الشرف أن يقدم أول من كورسات في عالم الهاردوير في هذه النقطه بسبب فقر المجال والمرافعة العربي من نوع هذا المحتوى من حيث الرابر دكي و قطع الهاردوير بشكل عام شكرا جزيلا لثقتك شكرا جزيلا لك بالتوفيقق
Who this course is for:
- Beginner Whitehat Hackers
- Computer science students
- Beginner Ethical hackers
- Beginners interested in hacking
- Beginners interested in programming
Instructor
To obtain a challenging and dynamic role in the cyber security field as a penetration tester, where I can utilize my skills and knowledge in software engineering and cyber security to contribute to the growth and success of the organization.
Education: Bachelor Degree Of Computer Science-CS, Modern Academy University, 2026
Work Experience:
Head Of Cyber Security at IEEE Modern Academy For Engineering 2024-2025
Information Security instructor at GDG (Google Developer Group) 2024-2025
Vice Head Technical on GDG (Google Developer Group) 2024-2025
Information Security instructor GDSC (Google Developer Students Clubs) Cyber Security Instructor Software Engineer, M3lomat the phone, 2017-2024
Designed and implemented various software applications to meet the needs of the clients
Information Security instructor at Code Spark
Skills :
Troubleshoot and resolved software issues in a timely manner to ensure high levels of customer satisfaction
Mentored junior software engineers and provided training on software development processes and methodologies
Penetration Tester and Bug Bounty Hunter, Freelance, 2017-present
Conducted thorough security assessments of various organizations to identify potential security vulnerabilities
Provided recommendations and solutions to improve the overall security posture of the clients
Participated in bug bounty programs and discovered and reported security flaws to earn rewards
Online Cybersecurity Teacher, Freelance, 2018-present
Taught various cyber security subjects to students online, including penetration testing and ethical hacking
Developed course materials and conducted hands-on exercises to help students understand and apply concepts
Provided feedback and guidance to students to help them improve their skills and knowledge in cyber security
Join me on this crazy adventure!
Certifications:
Certified Ethical Hacker (CEH)
CompTIA A+
Certified Information Systems Security Professional (CISSP)
Programming Languages:
Python
C++
Html
Bash
PHP
Technical Skills:
Penetration testing and ethical hacking
Web application security
Network security
Cryptography
Database security
Soft Skills:
Strong communication and interpersonal skills
Ability to work independently and in a team environment
Adaptable and quick learner
Organized and detail-oriented
References: Available upon request.