While experimenting with the idea of converting a normal USB (e.g., SanDisk) into a BadUSB or Rubber Ducky device, I explored its technical limitations and potential uses for cybersecurity learning.
This write-up documents what worked, what didn’t, and why reprogrammable microcontrollers (like those in Digispark or Rubber Ducky) are essential for true HID emulation.
I also shared a hands-on PowerShell experiment for extracting Wi-Fi credentials as a basic USB-based manual attack vector.
The article is written from an educational perspective — for those curious about hardware-based attacks, device emulation, and USB limitations in real-world cyber scenarios.
🔗 Medium article: [link above]
Click to Open Code Editor