Kautilya – Human Interface Device Hacking Toolkit

Use Netsparker


Kautilya is a human interface device hacking toolkit which provides various payloads for HIDs which may help with breaking into a computer during penetration tests.

Kautilya – Human Interface Device Hacking Toolkit

The Windows payloads and modules are written mostly in powershell (in combination with native commands) and are tested on Windows 7 and Windows 8. In principal Kautilya should work with any HID capable of acting as a keyboard. Kautilya has been tested on Teensy++ 2.0 and Teensy 3.0 from pjrc.com.

Payloads Available

Windows

  • Gather
    • Gather Information
    • Hashdump and Exfiltrate
    • Keylog and Exfiltrate
    • Sniffer
    • WLAN keys dump
    • Get Target Credentials
    • Dump LSA Secrets
    • Dump passwords in plain
    • Copy SAM
    • Dump Process Memory
    • Dump Windows Vault Credentials
  • Execute
    • Download and Execute
    • Connect to Hotspot and Execute code
    • Code Execution using Powershell
    • Code Execution using DNS TXT queries
    • Download and Execute PowerShell Script
    • Execute ShellCode
    • Reverse TCP Shell
  • Backdoor
    • Sethc and Utilman backdoor
    • Time based payload execution
    • HTTP backdoor
    • DNS TXT Backdoor
    • Wireless Rogue AP
    • Tracking Target Connectivity
    • Gupt Backdoor
  • Escalate
    • Remove Update
    • Forceful Browsing
  • Manage
    • Add an admin user
    • Change the default DNS server
    • Edit the hosts file
    • Add a user and Enable RDP
    • Add a user and Enable Telnet
    • Add a user and Enable Powershell Remoting
  • Drop Files
    • Drop a MS Word File
    • Drop a MS Excel File
    • Drop a CHM (Compiled HTML Help) file
    • Drop a Shortcut (.LNK) file
    • Drop a JAR file

Misc

  • Browse and Accept Java Signed Applet
  • Speak on Target

Linux

  • Download and Execute
  • Reverse Shells using built in tools
  • Code Execution
  • DNS TXT Code Execution
  • Perl reverse shell (MSF)

OSX

  • Download and Execute
  • DNS TXT Code Execution
  • Perl Reverse Shell (MSF)
  • Ruby Reverse Shell (MSF)

Usage

Run kautilya.rb and follow the menus. Kautilya asks for your inputs for various options. The generated payload is copied to the output directory of Kautilya.

The generated payload is an arduino sketch, ready to be used with Arduino IDE. Burn it to Human Interface Device of your choice and have fun!

You can download Kautilya here:

Kautilya-v0.5.5.zip

Or read more here.

Posted in: Hacking Tools, Hardware Hacking


Latest Posts:


Acunetix Vulnerability Scanner For Linux Now Available Acunetix Vulnerability Scanner For Linux Now Available
Acunetix Vulnerability Scanner For Linux is now available, now you get all of the functionality of Acunetix, with all of the dependability of Linux.
Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.


Comments are closed.