Are all USB-based attacks dependent on being able to inject keystrokes?
From what I’ve seen, USB-based attacks such as RubberDucky need to be able to open a terminal and then execute commands from there, usually to download and then install malware or to open a reverse shell.
Is this how most, if not all USB-… Continue reading Are all USB-based attacks dependent on being able to inject keystrokes?