The USB Rubber Ducky is back with a vengeance.
Hak5 USB Rubber Ducky 2.0
Reference:
Condition: New product
Manufacturer: Hak5
The second edition of the versatile pentest/hacker tool
The beloved hacker tool can now pwn you with its own programming language
10 Items
More info
The much-loved hacking tool has a new incarnation, released to coincide with the Def Con hacking conference this year, and creator Darren Kitchen was on hand to explain it.
What is it?
To the human eye, the USB Rubber Ducky looks like an unremarkable USB flash drive. Plug it into a computer, though, and the machine sees it as a USB keyboard — which means it accepts keystroke commands from the device just as if a person was typing them in.
“Everything it types is trusted to the same degree as the user is trusted,” Kitchen told me, “so it takes advantage of the trust model built in, where computers have been taught to trust a human. And a computer knows that a human typically communicates with it through clicking and typing.”
What can it do?
With the right approach, the possibilities are almost endless.
Already, previous versions of the Rubber Ducky could carry out attacks like creating a fake Windows pop-up box to harvest a user’s login credentials or causing Chrome to send all saved passwords to an attacker’s webserver. But these attacks had to be carefully crafted for specific operating systems and software versions and lacked the flexibility to work across platforms.
The newest Rubber Ducky aims to overcome these limitations. It ships with a major upgrade to the DuckyScript programming language, which is used to create the commands that the Rubber Ducky will enter into a target machine. While previous versions were mostly limited to writing keystroke sequences, DuckyScript 3.0 is a feature-rich language, letting users write functions, store variables, and use logic flow controls (i.e., if this... then that).
That means, for example, the new Ducky can run a test to see if it’s plugged into a Windows or Mac machine and conditionally execute code appropriate to each one or disable itself if it has been connected to the wrong target. It also can generate pseudorandom numbers and use them to add variable delay between keystrokes for a more human effect.
Perhaps most impressively, it can steal data from a target machine by encoding it in binary format and transmitting it through the signals meant to tell a keyboard when the CapsLock or NumLock LEDs should light up. With this method, an attacker could plug it in for a few seconds, tell someone, “Sorry, I guess that USB drive is broken,” and take it back with all their passwords saved.
How much of a threat is it?
In short, it could be a big one, but the need for physical device access means most people aren’t at risk of being a target.
Could I use it myself?
Accessories
Organic Gifts
Organic gifts from virtusfab.com represent a thoughtful and environmentally conscious choice for individuals seeking to celebrate special occasions...
Sep 3, 2025 204
Organic Roasted Coffee
Virtusfab's organic roasted coffee stands out in a competitive market due to its rigorous sourcing and meticulous roasting processes. Each batch...
Sep 3, 2025 202
Hand Picked Teas
Virtusfab specializes in offering a curated selection of hand-picked teas that exemplify quality and craftsmanship. Sourced from renowned...
Sep 3, 2025 201