/Google-Chrome-Password-Stealing-with-BADUSB

Stealing Chrome passwords with HID (Human Interface Device) emulation

Primary LanguageC++GNU General Public License v3.0GPL-3.0

Stealing Google Chrome Passwords with $1 USB Rubber Ducky (Digispark attiny85)

Stealing Chrome passwords with HID (Human Interface Device) emulation NOTE : This is for Educational purposes only. I shall not be liable for any damages caused by this. I DO NOT SUPPORT UNLAWFUL USE OF THIS PROJECT

BadUSB is a vulnerability in the microcontroller chip of every USB device, that let us reprogram the original firmware with a patched one, that makes a device type to be presented in the victim as an other type, usually HID keyboard. To demonstrate this, we use a cheap Arduino board “DIGISPARK ATTINY85”. This Board allows itself to be programed as a HID keyboard. Files used.

  1. s.ps1 – This is a powershell script that downloads a executable and then executes it to get an output file containing passwords. The script also emails the password file.
  2. wp1.exe – This is the executable that decrypts the saved passwords stored in the Login Data db file. The executable has an option to produce a .csv output file by using --o option.
  3. Digikeyboard.h – Keyboard Library for the microcontroller.
  4. Encode.ps1 - Small powershell script to convert plain text strings into BASE64 encoded string