In This Video Keyboard HID Attack Is Demonstrated.
It can target unlocked machine via USB in a matter of seconds. It does this by emulating a keyboard and mouse, blindly typing controlled commands, flailing the mouse pointer around and weaponizing mouse clicks.
What Is This?
Nearly every computer including desktops, laptops, tablets and smartphones take input from Humans via Keyboards. It's why there's a specification with the ubiquitous USB standard known as HID - or Human Interface Device. Simply put, any USB device claiming to be a Keyboard HID will be automatically detected and accepted by most modern operating systems. Whether it be a Windows, Mac, Linux or Android device the Keyboard is King.
By taking advantage of this inherent trust with scripted keystrokes at speeds beyond 1000 words per minute traditional countermeasures can be bypassed by this tireless trooper - the USB Attack.
7 Responses
Can you elaborate/show how you did it. It is useless for us like that. Looks like in the movies
this is wonder how to!!! tell us HOW TO do it!!!
Wow much impressive such explenation wow
Yeah this kind of post is quite useless here
I would suggest you to elaborate..... Else you might end up confusing people...
R64
Sorry there is no explanation given for now. I'll be happy to make them for you soon enough.
Make them soon. Thats the whole point of wonderhowto.
Share Your Thoughts