Drive Badger is split into 2 separate products:
Drive Badger and Mobile Badger however share:
Drive Badger is built on top of Kali Linux. Thus it leverages mechanisms like:
udevd
and systemd
for actual hard drive identificationThere is no way to distinguish between Drive Badger and ordinary Kali Linux, or to prove the fact of data exfiltration, until:
Mobile Badger is built on top of Debian Linux with systemd version 229 or newer, or its clone, eg. Ubuntu, Raspbian or any other. More details are provided in its dedicated Wiki.
operator connects Drive Badger USB drive to victim computer
operator boots Live USB Encrypted Persistence
Kali Linux starts in text mode (at this point operator can run startx
to enter graphics mode)
/etc/rc.drivebadger
script is run in background
it enumerates all local hard drives, including RAID devices, Bitlocked-encrypted drives etc., and makes a copy of "interesting" files (based on configuration rules) to special, hidden subdirectory on persistent partition