While I agree that there is a lot you can do if you can plug a malicious USB device into a computer and that you might not need to take advantage of the DLL problem in order to successfully complete the attack, my point is that it could help. Consider that the attack could be carried out either by convincing the user to plug in the USB device or by sneakly plugging it into their computer while they're away. Therefore, reducing the time it takes to complete and how much fuzz it makes on the screen could be a great advantage in a lot of situations. In my own experiments, a payload that simply starts transfering a DLL completes in about six seconds. You can unplug the device in less time than that, right after it opens cmd and starts the execution of the one line of commands. This is quicker than any other I've seen before.
Source: Gmail -> IFTTT-> Blogger
No comments:
Post a Comment