![]() Configuring the USB device to look like a DHCP server tricks the connected computer into communicating with it. The expert has tested the attack method using USB Armory and Hak5 LAN Turtle, two flash drive-size computers designed for penetration testing and various other security applications.įuller demonstrated how either of these devices can be set up to capture credentials from a locked, logged-in system by disguising them as a USB Ethernet adapter. ![]() However, researcher Rob Fuller has demonstrated that an attacker with physical access to the targeted device can capture its login credentials in just seconds as long as the machine is logged in. Many users might think that leaving their computer unattended does not pose any security risks as long as the device is locked. ![]() A researcher has shown how easy it is for hackers to steal credentials from locked Windows and Mac OS X computers using a small USB device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |