当前位置:网站首页>misc ez_ usb
misc ez_ usb
2022-07-07 07:43:00 【[mzq]】
ez_usb
wireshark Open file
Found to be usb Traffic , The length is 8 Is keyboard traffic ,usbhack Extract the data , Found that the failure , go back to wireshark It is found that there are two versions of traffic .
wireshark usb.src == “2.8.1” and usb.src == “2.10.1” Export specific groups
The two flows are derived as various pcapng file
Use UsbKeyboardDataHacker Directly analyze the content
UsbKeyboardDataHacker
#!/usr/bin/env python
import sys
import os
DataFileName = "usb.dat"
presses = []
normalKeys = {
"04":"a", "05":"b", "06":"c", "07":"d", "08":"e", "09":"f", "0a":"g", "0b":"h", "0c":"i", "0d":"j", "0e":"k", "0f":"l", "10":"m", "11":"n", "12":"o", "13":"p", "14":"q", "15":"r", "16":"s", "17":"t", "18":"u", "19":"v", "1a":"w", "1b":"x", "1c":"y", "1d":"z","1e":"1", "1f":"2", "20":"3", "21":"4", "22":"5", "23":"6","24":"7","25":"8","26":"9","27":"0","28":"<RET>","29":"<ESC>","2a":"<DEL>", "2b":"\t","2c":"<SPACE>","2d":"-","2e":"=","2f":"[","30":"]","31":"\\","32":"<NON>","33":";","34":"'","35":"<GA>","36":",","37":".","38":"/","39":"<CAP>","3a":"<F1>","3b":"<F2>", "3c":"<F3>","3d":"<F4>","3e":"<F5>","3f":"<F6>","40":"<F7>","41":"<F8>","42":"<F9>","43":"<F10>","44":"<F11>","45":"<F12>"}
shiftKeys = {
"04":"A", "05":"B", "06":"C", "07":"D", "08":"E", "09":"F", "0a":"G", "0b":"H", "0c":"I", "0d":"J", "0e":"K", "0f":"L", "10":"M", "11":"N", "12":"O", "13":"P", "14":"Q", "15":"R", "16":"S", "17":"T", "18":"U", "19":"V", "1a":"W", "1b":"X", "1c":"Y", "1d":"Z","1e":"!", "1f":"@", "20":"#", "21":"$", "22":"%", "23":"^","24":"&","25":"*","26":"(","27":")","28":"<RET>","29":"<ESC>","2a":"<DEL>", "2b":"\t","2c":"<SPACE>","2d":"_","2e":"+","2f":"{","30":"}","31":"|","32":"<NON>","33":"\"","34":":","35":"<GA>","36":"<","37":">","38":"?","39":"<CAP>","3a":"<F1>","3b":"<F2>", "3c":"<F3>","3d":"<F4>","3e":"<F5>","3f":"<F6>","40":"<F7>","41":"<F8>","42":"<F9>","43":"<F10>","44":"<F11>","45":"<F12>"}
def main():
# check argv
if len(sys.argv) != 2:
print("Usage : ")
print(" python UsbKeyboardHacker.py data.pcap")
print("Tips : ")
print(" To use this python script , you must install the tshark first.")
print(" You can use `sudo apt-get install tshark` to install it")
print("Author : ")
print(" WangYihang <[email protected]>")
print(" If you have any questions , please contact me by email.")
print(" Thank you for using.")
exit(1)
# get argv
pcapFilePath = sys.argv[1]
# get data of pcap
os.system("tshark -r %s -T fields -e usb.capdata 'usb.data_len == 8' > %s" % (pcapFilePath, DataFileName))
# read data
with open(DataFileName, "r") as f:
for line in f:
presses.append(line[0:-1])
# handle
result = ""
for press in presses:
if press == '':
continue
if ':' in press:
Bytes = press.split(":")
else:
Bytes = [press[i:i+2] for i in range(0, len(press), 2)]
if Bytes[0] == "00":
if Bytes[2] != "00" and normalKeys.get(Bytes[2]):
result += normalKeys[Bytes[2]]
elif int(Bytes[0],16) & 0b10 or int(Bytes[0],16) & 0b100000: # shift key is pressed.
if Bytes[2] != "00" and normalKeys.get(Bytes[2]):
result += shiftKeys[Bytes[2]]
else:
print("[-] Unknow Key : %s" % (Bytes[0]))
print("[+] Found : %s" % (result))
# clean the temp data
os.system("rm ./%s" % (DataFileName))
if __name__ == "__main__":
main()
Find out
5261722
yes rar The file header , Delete<CAP>
c<DEL>
And at the end of the filec
, Then save as rar file
decompression rar Password required for file discovery , Extract another version of usb Traffic discovery password
35c535765e50074a
flag{
20de17cc-d2c1-4b61-bebd-41159ed7172d}
边栏推荐
- 在线直播系统源码,使用ValueAnimator实现view放大缩小动画效果
- 95后CV工程师晒出工资单,狠补了这个,真香...
- Stockage et pratique des données en langage C (haut niveau)
- Wechat applet full stack development practice Chapter 3 Introduction and use of APIs commonly used in wechat applet development -- 3.9 introduction to network interface (IX) extending the request3 met
- nacos
- Six methods of flattening arrays with JS
- 电商常规问题part1
- [cloud native] how to give full play to memory advantage of memory database
- 【p2p】本地抓包
- 抽丝剥茧C语言(高阶)数据的储存+练习
猜你喜欢
Jenkins remote build project timeout problem
Jenkins远程构建项目超时的问题
[2022 CISCN]初赛 web题目复现
95后CV工程师晒出工资单,狠补了这个,真香...
resource 创建包方式
Implementing data dictionary with JSP custom tag
身边35岁程序员如何建立起技术护城河?
nacos
ROS2规划系统plansys2简单的例子
The metauniverse of the platofarm farm continues to expand, with Dao governance as the core
随机推荐
L'externalisation a duré trois ans.
Robot technology innovation and practice old version outline
Live broadcast platform source code, foldable menu bar
Dynamics CRM server deployment - restore database prompt: the database is in use
Kbu1510-asemi power supply special 15A rectifier bridge kbu1510
Blue Bridge Cup Netizen age (violence)
Leetcode-206. Reverse Linked List
IO流 file
Music | cat and mouse -- classic not only plot
English translation is too difficult? I wrote two translation scripts with crawler in a rage
Wechat applet full stack development practice Chapter 3 Introduction and use of APIs commonly used in wechat applet development -- 3.10 tabbar component (I) how to open and use the default tabbar comp
[2022 ACTF]web题目复现
A concurrent rule verification implementation
电商常规问题part1
Write CPU yourself -- Chapter 9 -- learning notes
【云原生】内存数据库如何发挥内存优势
Weibo publishing cases
Leetcode sword finger offer brush questions - day 20
Differences between H5 architecture and native architecture
通信设备商,到底有哪些岗位?