From 34463875627356933f5bea9d37e719212cd91625 Mon Sep 17 00:00:00 2001 From: Nassim Bentarka Date: Fri, 16 Feb 2018 23:39:36 +0000 Subject: [PATCH] Update README.md --- Rapid_Shell/README.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/Rapid_Shell/README.md b/Rapid_Shell/README.md index c177a0d..f72e210 100644 --- a/Rapid_Shell/README.md +++ b/Rapid_Shell/README.md @@ -7,7 +7,11 @@ - Exposed time: 15 seconds (means in 50% of time since plugging in the Digispark, the screen will have movement) # Additional information: - - You can reduce the running time by 5-8 seconds, visit this page: https://digistump.com/wiki/digispark/tricks + #### How it works: + The Digispark once it is plugged in will take 5 seconds for the bootloader, and starts its job when the second led lights up, it will first open CMD as administrator using the start menu and create a new file which will be used to trigger the attack and open the shell. + There is another way to open CMD as administrator, which is using the run prompt and running this command: "powershell Start-Process cmd -Verb runA" but it showed that it takes much time to open the powershell prompt. If you desire to use this method refer to the comments in the code. + #### Tricks: + - You can reduce the running time by 5-8 seconds by tricking the bootloader, visit [this page](https://digistump.com/wiki/digispark/tricks) for more. - The powershell script features a 6 seconds screensaver to hide the backdooring process, we will make it possible to disable/enable in the future. - If the keyboard layout of the target machine is not in QWERTY/English you can use the bash script on a linux machine to convert text from AZERTY <--> QWERTY and vice versa.