It may look like an ordinary USB on the outside, but in its core the device is composed of a micro SD slot placement which can be pre-programmed to deliver a payload as the device disguises itself as a keyboard human interface device (HID). Linux, Macs, Windows, and mobile Android devices are all potential platforms for the Rubber Ducky to infiltrate, as most standards are now HID compatible for simple plug-and-play. There is also a small button on the board to replay for another attack, saving you time from having to rescript the same attack on the micro SD . The Rubber ducky device includes a case to mask the device as any other USB storage commonly seen achieving promiscuity almost effortlessly. There are plenty of resources available as we consider what some of its capabilities are.
There are already plenty of pre-made attacks that are given freely to use (with permission and...