![]() This device can be pre-programmed to then inject numerous keystrokes into the unsuspecting users' computer. It can be carried out by using a flash drive created with a hidden exploit, that allows it to mimic a keyboard. Once connected to its target computer, a BadUSB could then discreetly execute harmful commands or inject malicious payloads.Ī common type of BadUSB attack is the Rubber Ducky. Last updated on: MaWhat is BadUSB Attack and How to PreventīadUSB attack is when a USB device has an in-built firmware vulnerability that allows itself to be disguised as a human interface device.
0 Comments
Leave a Reply. |