![]() So, the attacker inserts this flash drive into the victim's computer, the computer perceives it as a keyboard. For example, thanks to the hotkeys, you can start the terminal and execute the necessary commands in it. Hotkeys allow you to launch and manage various applications by pressing keyboard shortcuts. At first glance, this may seem like nothing more than a funny toy, but everything changes when we remember the hotkeys. Here is an example of such a product, I myself have not experienced it, but I will trust the reviews and description.Īs you understand, you can control the device remotely by sending keystrokes to the target computer. Similar devices you can buy on the darknet forums and on AliExpress. For example, a USB flash drive pretends to a computer as a keyboard and gets all the rights of the keyboard. This is a very dangerous attack when a device connected via USB port begins to pretend to be another. I previously wrote about the attack BadUSB. I will neither advise doing it nor discourage from it, I’ll just tell you about it as it is. We will consider one of such recommendations today. ![]() When setting up complex security, there are many recommendations, the need to implement them depends on the level of your paranoia and the threats which you would like to protect yourself from. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |