insecurityofthings / jackit

JackIt - Exploit Code for Mousejack
802 stars 144 forks source link

"Sending attack to ~~ on channel ~~" with no results #68

Open smithm19 opened 2 years ago

smithm19 commented 2 years ago

Howdy all

I've been messing with jackit for over a week now and after getting the dongle setup, detecting my vulnerable mouse, and giving it a simple PoC ducky script I can't get the attack to trigger. It will say "Ping success on channel X" "Sending attack... " and that is it. No error message and nothing triggers on the target.

I've tried on a fresh VM, a new dongle, and a few different vulnerable mice - but it's always the same success message with no results.

Curious if anyone has had similar issues and if there is a way to get past this roadblock. Or even just a thought on what could be causing it so I can look into it

Thanks

Edit: I've been mainly testing with a Microsoft Wireless Mobile Mouse 3500 - just for added info

r00flr00fl commented 2 years ago

I have the same issues, probably it just got fixed by Firmware or OS updates.

smithm19 commented 2 years ago

I've reached out to a couple security people who are actively using this attack - and it works for them fine on slightly older systems they're using. So I went back to a 2019 version of kali, manually installed older versions of every dependency (back to a ~2019 versions), and I still have no luck.

At this point I think it has to do with the process of flashing the dongle - but I don't really have concrete reasons why. I'll update this thread if I come across anything.