![]() After discussing the pros and cons of the three types of malicious USB keys, this post will walk you through how to create a spoofed HID keys like the one I demoed at the Blackhat conference during my talk on USB drop attacks:ĭoes dropping usb drives in parking lots and other places really work? - Blackhat USA 2016 This blog post follows up on the study by showing how reliable and realistic-looking malicious USB keys can be created. ![]() Dropping a malicious USB key in a parking lot is an effective attack vector, as demonstrated by our recent large-scale study.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |