I published the following diary on isc.sans.edu: “Malicious Python Script Behaving Like a Rubber Ducky“:
Last week, it was SANSFIRE in Washington where I presented a SANS@Night talk about malicious Python scripts in Windows environment. I’m still looking for more fresh meat and, yesterday, I found another interesting one.
Do you remember the Rubber Ducky? Pentesters like this kind of gadgets. I still have one as well as others with WiFi capabilities The idea behind these USB keys is to deliver a payload by simulating a keyboard. When you connect then to a computer, they are detected as a HID (“Human Interface Device”). The payload will be “injected” like if the user pressed all the keys one by one… [Read more]
The post [SANS ISC] Malicious Python Script Behaving Like a Rubber Ducky appeared first on /dev/random.
Click to Open Code Editor