HID / Physical Implants

Tools that masquerade as trusted peripherals (keyboard, mouse, cable, USB NIC) to automate actions or capture data. Think O.MG Cable, Rubber Ducky, Bash Bunny, and Key Croc—great for awareness training and blue-team hardening when used with permission.

Quick-start checklist

  1. Authorization: Only test in your own lab or with explicit written permission.
  2. Host OS: Know your target OS prompts/policies (Windows, macOS, Linux; mobile restrictions).
  3. Payload hygiene: Use transparent, reversible demos (open a text editor, display a banner, etc.).
  4. Isolation: Test on non-production machines or disposable VMs with snapshots.
  5. Evidence: Log what you run, when, and on which host to support blue-team learning.

Primer: HID, USB descriptors & trust

A HID (Human Interface Device) like a keyboard or mouse is implicitly trusted by most OSs. HID tools present themselves with USB descriptors that say “I am a keyboard,” then send keystrokes at machine speed. Some implants also expose storage, serial, or a tiny network card to stage files or callbacks.

Examples:
  • O.MG Cable — looks like a normal cable; includes an implant that can run keystroke payloads and beacon/control over Wi-Fi.
  • Rubber Ducky — keystroke injection via DuckyScript; plug-and-type macros.
  • Bash Bunny — multi-mode (HID, storage, RNDIS/ECM) with on-device scripts.
  • Key Croc — inline keyboard implant for logging and triggers (authorized labs only).
HID Implant Host OS Descriptors → Device ready → Keystroke sequence
Once a host accepts a “keyboard,” keystrokes are trusted like a human typed them.

Common lab workflows

1) Awareness demo (safe keystrokes)

2) Conditional payloads

3) Multi-mode staging (Bash Bunny-style)

4) Blue-team validation

Ethics: Never deploy implants on production endpoints, shared facilities, or personal devices without explicit authorization. Keep demonstrations transparent and reversible.

Defenses & hardening

Troubleshooting

FAQ

Do “data-blocker” charge adapters help?

Yes—by removing data lines, the host never enumerates a device. Great for public charging where you don’t need data.

Are modern OSs immune?

No. They have features to reduce risk (restricted modes, prompts, allowlists), but a trusted keyboard can still type. Policy + user awareness is key.

Is this the same as BadUSB over storage?

Related idea. HID implants focus on keystrokes; other tools abuse storage or USB networking. Multi-mode devices can combine them.

Devices for HID / Implants

Useful references

Legal & ethics: See Ethics for permission boundaries and safe, authorized demos.