How far can a malicious USB device get you on a server?
If the device is plugged in when the user is already logged in, then of course the device can just pretend to be a keyboard, open a terminal, and run a compromising command. (shortcuts for terminals may vary, but are usually … Continue reading How far can a malicious USB device get you on a server?