HID attacks
Nethunter has several built in tools that allow you to configure an HID attack. In one of these tools, Nethunter leverages the standard command line to perform several commands in succession. To access the HID attacks menu, click on Nethunter and then HID Attacks. Once on the HID Attack screen, we will see two options. One is a PowerSploit attack and the second is the Windows CMD attack. For this section, we will look at the Windows CMD attack in detail.
In this scenario, we are going to use the Nethunter platform and connect it to a target machine. Our attack will leverage the HID vulnerability to run the command ipconfig
and add a user, offsec
, to the system using the command net user offsec Nethunter! / add
. Finally, we will add that user account to the local administrator's group using the command net localgroup administrators offsec /add
:
Next, we need to set the User Account Control (UAC) bypass. This allows Nethunter to run the command line as administrator. Click on UAC...