data extraction via Badusb from a "secure endpoint"
I am aware of the ducky quacky devices, however, is there a possibility of impersonating an usb input device to extract data from the target computer?
Michael Smith’s defcon talk ( http://www.slideshare.net/the_netlocksmith/d… Continue reading data extraction via Badusb from a "secure endpoint"