I do not take any responsibility, in regards to the actions taken by readers of this article. This post is for research and educational purposes only. This guide will take you through the process of doing the same, however before we dive in I would like to provide an important disclaimer. After heavy research and a month or two of messing around with an old Android phone I was able to recreate it. I wanted to do all of the above but instead of a USB, I wanted to plug an Android phone into a computer.
This is a very powerful tool, however I wanted to take it a step further. Often these keystrokes are commands that tell the victim computer to connect itself to the attacker’s computer (aka a reverse shell). How it works is an attacker plugs a USB into a computer, this USB acts as a keyboard and injects keystrokes at superhuman speed. A rubber ducky is a tool that can be used to takeover most computers just by being plugged into them for a few seconds.