Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
achr2
on Oct 12, 2016
|
parent
|
context
|
favorite
| on:
What are malicious USB keys and how to create a re...
A really sneaky method would be to create a USB suppository, that looked like a large USB key but would leave the active part inserted inside the socket after the target pulls out the seemingly defective key.
mablap
on Oct 13, 2016
[–]
And how is the port supposed the stay functional upon removal of the key? The point of this attack is stealth.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: