Ethical Hacking testing – USB Rubber Ducky

What is USB Rubber Ducky?

There is a surfeit of devices available in the market for pentesting and hacking devices and systems. These devices are usually designed to facilitate ethical hacking and fortify the security of your device and networks. 

USB Rubber Ducky is a human interface gadget that resembles a USB pen drive. However, it is used for penetration testing and hacking. 

How does a USB Rubber Ducky work?

You must be wondering how this little device conducts the enormous pentesting and hacking tasks.

USB Rubber Ducky acts like a Human Interface device just like familiar devices that include keyboards, mouse and joysticks. It behaves like an interface between the computer and the human. Thus, it cannot be detected by computers. Any anti-virus systems or firewalls cannot even notice it. 

USB Rubber Ducky acts like a keyboard has keystrokes by default, which are enabled automatically as soon as it connects to laptops or computers. It enacts the commands given by the user. The commands used are called payloads. Payloads are unique codes used by hackers. The payload used by USB Rubber Ducky is written in Ducky Script. The device runs at a swift speed of 1000 words per minute and steals the targeted user’s data. 

What does USB Rubber Ducky consist of?

The USB Rubber Ducky consists of the following parts that help it accomplish its tasks efficiently:

MicroSD card:

MicroSD cards store all the payloads and ducky scripts. When the device is connected to the targeted device, it steals the data using the payloads saved in the MicroSD card. The payloads saved here are transferred to the keyboard adapter for creating keystrokes. 

MicroSD-to-USB adapter:

This is a mini plastic USB dongle used to mount the MicroSD card on the device as a regular USB device to transmit the payload. 

Mini keyboard adapter:

This is a tiny silicon chip that inserts a MicroSD card on it. The keyboard adapter is responsible for sending keystrokes to the device. 

Once you have USB Rubber Ducky in your hands, you need to create your first payload to get started by installing Duck Encoder. 

To create your payload through the Duck Encoder, fit the microSD card in your computer and make your payload using Ducky scripts. Once your payload is ready, you are prepared to use the device. 

Key Features of USB Rubber Ducky:

The Key features and advantages of the USB Rubber Ducky includes:

  • This device is usually used as a key injection tool for commanding keystrokes. These keystrokes might vary in nature. Those employed in ethical hacking are positive keystrokes, while those used for illegal data thefts are negative.
  • The device is also used for scrutinizing the vulnerabilities and weaknesses of the targeted system. 
  • Once you are aware of the vulnerabilities of your system, you can increase your system security. 
  • The device is quick and efficient, capable of sending 1000 words per minute. 
  • The security system of your system is also unable to detect the device. Therefore, there is no hindrance while using the USB Rubber Ducky.


USB Rubber Ducky can quickly get you the required credentials and essential data at lightning speed with few keystrokes and at a cheaper rate. Hence, It is a highly recommended pentest tool.

Wifi Pineapple

WiFi Pineapple uses and its latest version

What is WiFi Pineapple?

Hacking culture and data thefts have prevailed in our society with the advent and rapid progress of technology. It has become increasingly essential for us to secure our data. For our convenience, various network security administrators are working to ensure the safety of the users. They conduct pentesting tasks that are similar to ethical hacking. These tests help to scrutinize and analyze the security system’s vulnerabilities and weaknesses, which allows the illegal hackers in the system exploitation. 

Penetration tests are easily carried out with the help of WiFi Pineapple

WiFi Pineapple is a wireless auditing device from Hak5 that helps ethical hackers or security administrators to conduct pen-testing. 

WiFiEngineers of Hak5 created WiFi Pineapple in 2008 to facilitate security admins and make advanced pentesting convenient.

Working of a WiFi Pineapple

WiFi Pineapple works in a relatively simple way. The device behaves as a hotspot honeypot and acts as a man in the middle. It stays transparent to the user. The user connects to the honeypot, not the actual wireless access. It inspects the data flow between the user and the network. The honeypot then transmits the SSID of the wireless location you have connected to. You may also Know: Religion Uses Technology To Influence and Control

The other way that WiFi Pineapple works is by artificially connecting you to a WiFi hotspot you might have used in the past. It might be your workplace WiFi or home WiFi. The device examines all the WiFi access points and tricks the user to automatically connect to the fake WiFi without revealing the actual SSID or network number. The user assumes they have connected to it in the past since the auto-connect feature is enabled. After the user is connected to the WiFi, the WiFi Pineapple collects all the required information, including the network SSID and other data. 

Uses of WiFi Pineapple

WiFi Pineapple is used for the following purposes:

Penetration Testing:

WiFi pineapple is used for Penetration testing. The features offered by the device are easily accessible and powerful. Users can easily download the suite of testing modules called PineAP. It provides logging, tracking, and reporting tools that can efficiently conduct the MitM attacks. 

Various companies hire professionals to carry out pentesting to audit their network and secure their networks. 

With tools provided by WiFi Pineapple, pentesting is convenient.


When the WiFi Pineapple gains access to the targeted network, it can even hack the user’s device, including the personal information and passwords. Therefore, the users must not connect to public networks or use a VPN. 

The latest version of WiFi Pineapple

Hak5 has come up with a brand new version of WiFi pineapple device called WiFi Pineapple Mark VII. The latest version offers impeccable performance ranging from an easy-to-use user interface with a massive application ecosystem, supercharging your workflow. It also allows penetration testing and Cloud C2 for obtaining remote access to a device not within your range from anywhere. It also makes MIT attacks easier. Another impressive feature of Mark VII is, it doesn’t need any software installation. It is now accessible on Windows, OS, and Android.

What is Ethical Hacking?

Ethical hacking: White hat, black hat?

You might have noticed that mainstream media has this kind of love-hate relationship with hackers. In movies and series we see both sides of hacking: the good, altruistic hacker (like in the series Mr. Robot and the infamous 1995 movie Hackers), as well as the evil, ambitious hacker (like the Puppeteer in the Ghost in the Shell franchise, although the protagonist is also a kind of hacker herself, as well as the antagonist in Live Free or Die Hard).

In the news, however, the portrayal tends to be more negative. There are good sides to the same coin, and a knowledge of how hackers work help programmers maintain apps. We’ve seen the demonization of Anonymous during the height of hacktivism around 2010, the controversy over Russian hackers allegedly interfering with the 2016 elections in the US, including Hilary Clinton’s hacked emails, and rumors about military hacker armies in countries such as Iran, China, Russia, and North Korea.

However, hacking is a culture and a lifestyle. There are many people involved with it, with many different worldviews and opinions, and that leads to many different kinds of hackers, notably recognized for their “hats”. Let’s talk a bit about them.

Black hat

The black hat hacker is the “villain”. They are hackers that use their knowledge of cybersecurity and exploiting vulnerabilities to get money, either by using it to steal money for themselves, by stealing data to sell online, or doing those kinds of things for hire. They are also the kinds of people who create viruses, spyware, worms, ransomware, and other kinds of malicious software.

The black hats can either act alone, doing their own thing, or can also be a part of groups, commonly smaller groups. They value their anonymity and do all they can to remain hidden from everyone, even their clients. It can take a few white hat hackers to be able to track them down, if that is even possible.

White hat

White hat hackers are the “good guys”. They are ethical hackers, meaning they strictly adhere to an ethical code, and as such only use their skills to help people. They are commonly found in large tech and security companies with the objective of discovering and fixing security vulnerabilities before the black hats do so.

If you read on the news about an exploit having been discovered in a product of a major company, it probably means that a white hat discovered it, and it has already been fixed.

The guy that discovered that Trump’s Twitter password was “maga2020” and told the authorities instead of messing around? Yes, he is a white hat hacker too. That’s how they are.

They tend to be so helpful for finding exploits that it is common to see companies offering huge rewards for them when they manage to find such vulnerabilities, with Mozilla paying up to 10,000 dollars and Google, 31,337 (yes, that is the exact amount, the pun was definitely intended).

Red hat

The “chaotic good” of the hacker world, red hats follow their own ethical code, but also aim to do good. They are commonly regarded as “vigilantes”, and are known for going after and defeating black hats using their own means, frequently without aid from the police.

Consequently, they are pretty controversial. Who they will go after will depend on their own definition of white hat and black hat. Just the same, they sometimes turn their attention to targets outside of hacker culture, such as organized crime and extremist groups, and their techniques may involve tracking and exposing people publicly or even “bricking” their enemies’ computers (that is, making them unusable).

Many hacktivists tend to be red hats, commonly defying the line between legality and illegality and good and evil, including controversial groups such as Anonymous and Wikileaks.

The most recent red hat attack was the hack on the Parler platform: a group managed to obtain access to the administration software of their server, and with that gained access to every user’s data and aided the FBI in finding the Capitol invaders.

Hacker culture is a pretty diverse and complex world, but you can rest assured that there are many good guys out there protecting us from the bad guys.