While I agree that there is a lot you can do if you can plug a
malicious USB device into a computer and that you might not need
to take advantage of the DLL problem in order to successfully
complete the attack, my point is that it could help.
Consider that the attack could be carried out either by
On 2016-01-08 00:50:51 -0200, Rodrigo Menezes wrote:
> Many of us have now been long aware of the possibility of
> programming an USB device to emulate a keyboard and automatically
> send keystrokes in order to perform malicious actions on a
> computer. Some of the most interesting payloads th
Many of us have now been long aware of the possibility of programming an USB
device to emulate a keyboard and automatically send keystrokes in order to
perform malicious actions on a computer. Some of the most interesting payloads
that can be used with this technique are based around downloading