Nice work. I came across your stuff while playing with Hak5’s USB Ducky- an arduino/usb that automatically runs exploits such as Utilman upon insertion. If you’re not familiar with it already, I’m hoping you’ll check it out. I’m sure you could expand the list of payloads. Here’s what’s available now: https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payloads
Comment by joe bradley — Tuesday 5 March 2013 @ 22:44
@joe I’ve heard about it, but I’ll take a closer look.
Comment by Didier Stevens — Wednesday 6 March 2013 @ 20:43
RSS feed for comments on this post. TrackBack URI
Fill in your details below or click an icon to log in:
You are commenting using your WordPress.com account. ( Log Out / Change )
You are commenting using your Twitter account. ( Log Out / Change )
You are commenting using your Facebook account. ( Log Out / Change )
You are commenting using your Google+ account. ( Log Out / Change )
Connecting to %s
Notify me of new comments via email.
Notify me of new posts via email.
Blog at WordPress.com.
Get every new post delivered to your Inbox.
Join 452 other followers