Forum Rule: Always post complete source code & details to reproduce any issue!
Tab Content
No Recent Activity
About ZTiK.nl

Basic Information

About ZTiK.nl
Biography:
Coming from a webdesign background, I had completely no experience with microcontrollers, C, or anything like a technical/electronics education.
I am comfortable with PHP, SQL and CSS, and a tiny amount .NET experience, but since I have received my Teensy 3.0 on december 31st 2012 I have been learning (experimenting) a lot more than I would ever believe to be possible.
Nonetheless, I still feel like a 5 year old asking silly questions to all the 'grown-ups' around on the forum here.
(thank you all for your patience with me!)

The first time I heard about the Teensy was in a video by Irongeek (and site http://www.irongeek.com/i.php?page=security/programmable-hid-usb-keystroke-dongle)
When I realized what could be done with a keystroke logger I checked the Projects list, found the amazing Laser-Ball, and fell in love with that vid.

I ordered my Teensy straight from PJRC.com even though I live in the Netherlands because I read a lot about counterfeit teensy's being sold, but the next time I will order from Floris.cc.
Faster delivery and delivery costs a bit cheaper too ;)


At first I played with both Kautilya and Irongeek's PHUKD library, but quite quickly reverted to a mix of my own code with a few of the PHUKD library's functions.
This was a pentesting setup that could start a UAC enabled powershell window hidden below the active taskbar without being displayed in the taskbar.
There was no need to start a cmd.exe process first, since it was all coded to start from a WINKEY + R instead of the search field inside the start menu.
Once connected it would run the powershell, evaluate which windows version + which architecture was being used, then write out a reverse staged powershell backdoor, which was secured with an AES encrypted password file (if the file cannot be opened, the backdoor doesn't function anymore).
From the moment of connecting the Teensy 3.0 it takes 17 sec. to have the script completed and unplug the Teensy.

Once this was properly tested on several Windows machines I am running myself and a few my friends allowed me to test on their machines, I had to find a new project, a new goal to reach...
At this time I was playing a game called Fallout... and one of the first things that came to mind was the PIP-BOY 3000 wristcomputer that features prominently in the game.

This is still a work in progress, and if you're still interested in reading more, check out this topic:
http://forum.pjrc.com/threads/17717-PIP-GRL-31415-(not-spam!)



I want to thank you for your interest in me and taking the time to read this.
I also want to thank all the people on this forum (which probably means you too) for all the support I've been given to make my project succeed, I couldn't have done this without any of you!

With kind regards,

ZTiK.nl



P.S. I am willing to share any code I have (re)written, EXCEPT for my pentesting scripts.
These can easily be used for malicious purposes, something I do not wish to have any involvement/association with...


---
Location:
Amsterdam
Interests:
Networking, Security, Webdesign

Statistics


Total Posts
Total Posts
179
Posts Per Day
0.09
Last Post
PIP-GRL 31415 (not spam!) 05-30-2013 01:46 AM
General Information
Last Activity
05-30-2013 01:47 AM
Join Date
12-31-2012