WHID Injector: Next Level USB attack


This is Education Purposes Only

It's 2020, and I believe most of you (Geeks, Tech Guy, IT Pro's, Pentesters) have already heard or Know about keystroke injection tools such as Rubber DuckyPHUKD. 
Same as the above many good research ideas have been published, such as Iron HID, Mousejack, and the coolest USaBUSe.

What is WHID Injector?
If you are new to the topic, I will note a brief introduction WHID Injectors. WHID stands for "Wifi HID. " HID means a human interface device, ie. Mouse, Keyboard.

So You may wonder how the HID device been transformed into WHID and using to conduct a cyber attack. Let's get in there in the next topic. First, we will explore how WHID had made.

WHID contains two main elements. Primarily Atmega 32u4 (commonly used in many Arduino boards) featuring self-programming flash program memory and ESP-12s to provides the wifi capabilities and is widely used in IoT projects.

Atmega 32u4


ESP-12s


 

 







  

So what can be done through a combination of these two tech pieces?

 

As you may know, with the enhancement of technology, IT Security personals had deploy polices to block USB's to stop unauthorized devices from being plugged into the organization computers. Mostly the main pattern used is to block " Mass storage Devices. " There is a small glitch in here. We use other wifi peripherals such as keyboards, mouse, Internet Dongles, USB hubs, etc.... Attackers had invented a genius product based on this glitch. That is none other than WHID
Cactus WHID Wifi USB

Imagine a situation where intruders send an attacking script or simply payload, to the computer via such exception device. For example what if the payload drive as keyboard input, open power shell or cmd in the back group without user detection and search for a specific file and send it via email and delete the email ? or transmit the file to a flying NAS beyond your organization 21st floor ( Flying NAS: Drone can be configured as NAS, will cover this in future articular)

I believe now you can understand the depth of WHID attack and with imagination and creativity how far such attack and be lunched.

WHID Injector: an USB-Rubberducky/BadUSB on Steroids

WHID Injector: How to Bring HID Attacks 








 

 

 

 

 

Are these available in the market?  

 

While I was looking for a cheap alternative for Rubber ducky, I have come across the word WHID. So i just did a search in Aliexpress.com, just the work WHID. You won't believe there are many options available as shown in below image πŸ˜€


 
Ali express search result : WHID

  πŸ‘‰For the price starting 10 - 40 USD, you can get a ready-made WHID with ready-made payloads.
Even a non-technical person can buy such a device and play with the tool without any worries.
I have purchased one and play a little, and its working like a charm for me.πŸ™ˆπŸ™‰

More Research Articles...

 

If you are more interested in this subject, I'm suggesting following articles that have depth knowledge on the subject matter from researchers who are specialized and humble to share the knowledge. Out of the below articles, "Luca Bongiorni" is my favorite writer who had shared his research knowledge from scratch. 

WHID Ninja - Luca Bongiorni



 
This is my first article, and if you have any suggestions, comments, improvements tips, please let me know. See you all with another Article on next week.







Comments

Popular posts from this blog

Flying FTP Server

Understanding AiTM Attacks: How Cybercriminals Hijack Your Online Sessions (And How to Stop Them)

Fortifying Your Digital Realm: Unleashing the Power of Microsoft 365 Defender