Open smithm19 opened 2 years ago
I have the same issues, probably it just got fixed by Firmware or OS updates.
I've reached out to a couple security people who are actively using this attack - and it works for them fine on slightly older systems they're using. So I went back to a 2019 version of kali, manually installed older versions of every dependency (back to a ~2019 versions), and I still have no luck.
At this point I think it has to do with the process of flashing the dongle - but I don't really have concrete reasons why. I'll update this thread if I come across anything.
Howdy all
I've been messing with jackit for over a week now and after getting the dongle setup, detecting my vulnerable mouse, and giving it a simple PoC ducky script I can't get the attack to trigger. It will say "Ping success on channel X" "Sending attack... " and that is it. No error message and nothing triggers on the target.
I've tried on a fresh VM, a new dongle, and a few different vulnerable mice - but it's always the same success message with no results.
Curious if anyone has had similar issues and if there is a way to get past this roadblock. Or even just a thought on what could be causing it so I can look into it
Thanks
Edit: I've been mainly testing with a Microsoft Wireless Mobile Mouse 3500 - just for added info