Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

Experimenting with USB-Based Attacks: Can a Standard USB Become a Bad USB? (Write-up)

published on 2025-05-31 17:20:38 UTC by /u/Equivalent-Sir5669
Content:

While experimenting with the idea of converting a normal USB (e.g., SanDisk) into a BadUSB or Rubber Ducky device, I explored its technical limitations and potential uses for cybersecurity learning.

This write-up documents what worked, what didn’t, and why reprogrammable microcontrollers (like those in Digispark or Rubber Ducky) are essential for true HID emulation.

I also shared a hands-on PowerShell experiment for extracting Wi-Fi credentials as a basic USB-based manual attack vector.

The article is written from an educational perspective — for those curious about hardware-based attacks, device emulation, and USB limitations in real-world cyber scenarios.

🔗 Medium article: [link above]

submitted by /u/Equivalent-Sir5669
[link] [comments]
Article: Experimenting with USB-Based Attacks: Can a Standard USB Become a Bad USB? (Write-up) - published 4 months ago.

https://www.reddit.com/r/netsec/comments/1l02exx/experimenting_with_usbbased_attacks_can_a/   
Published: 2025 05 31 17:20:38
Received: 2025 05 31 17:39:17
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Views: 21

Custom HTML Block

Click to Open Code Editor