Stealing Chrome passwords with HID (Human Interface Device) emulation NOTE : This is for Educational purposes only. I shall not be liable for any damages caused by this. I DO NOT SUPPORT UNLAWFUL USE OF THIS PROJECT
BadUSB is a vulnerability in the microcontroller chip of every USB device, that let us reprogram the original firmware with a patched one, that makes a device type to be presented in the victim as an other type, usually HID keyboard. To demonstrate this, we use a cheap Arduino board “DIGISPARK ATTINY85”. This Board allows itself to be programed as a HID keyboard. Files used.
- s.ps1 – This is a powershell script that downloads a executable and then executes it to get an output file containing passwords. The script also emails the password file.
- wp1.exe – This is the executable that decrypts the saved passwords stored in the Login Data db file. The executable has an option to produce a .csv output file by using --o option.
- Digikeyboard.h – Keyboard Library for the microcontroller.
- Encode.ps1 - Small powershell script to convert plain text strings into BASE64 encoded string