TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: What stops a random USB device from rooting Windows?

16 pointsby 5ESSabout 3 years ago
Ok so I’m learning computer security and I had an idea for an attack method and it’s so simple I wanna know if it’s already put into practice.<p>Basically it would be a USB device that tells the Windows system it’s a generic keyboard+mouse. Then it would simulate the entry of input something like: 1) WinKey + R 2) cmd.exe [enter] 3) [enters or pasted a malicious script] 4) await UAC prompt. Click pre-calculated dimensions for the button based on screen size&#x2F;dpi ratio..<p>Now the entire system is rooted in under 2 seconds.<p>Can someone explain what mitigations if any Microsoft has put in place (prior to the recent ASR which is new and probably also vulnerable?) to disable this [fake mouse and keyboard attack] ?

7 comments

paywallasinbeerabout 3 years ago
Here&#x27;s something very similar to what you&#x27;re thinking of.[0] There&#x27;s a low cost alternative if you&#x27;d like to experiment.[1]<p>[0] <a href="https:&#x2F;&#x2F;shop.hak5.org&#x2F;products&#x2F;usb-rubber-ducky-deluxe" rel="nofollow">https:&#x2F;&#x2F;shop.hak5.org&#x2F;products&#x2F;usb-rubber-ducky-deluxe</a><p>[1] <a href="https:&#x2F;&#x2F;sequr.be&#x2F;blog&#x2F;2021&#x2F;02&#x2F;attiny85-rubber-ducky&#x2F;" rel="nofollow">https:&#x2F;&#x2F;sequr.be&#x2F;blog&#x2F;2021&#x2F;02&#x2F;attiny85-rubber-ducky&#x2F;</a>
评论 #31075996 未加载
JackGreyhatabout 3 years ago
It should be common practise to run your every day computer life from a &quot;normal&quot;, non-privileged user account. This way, automating UAC confirmations are impossible, given that alternative credentials have to be entered for the UAC to be authorized. Yet, you&#x27;ll find that many people do not do this.
hnuser123456about 3 years ago
If the current user isn&#x27;t an admin, they can&#x27;t just click through UAC.<p>If they are an admin, they could just do this manually.<p>Either way, no privilege escalation, which &quot;rooting&quot; typically implies.<p>Sure, you could make a USB stick that automates any user input, but you could just make the same inputs yourself with the keyboard and mouse already at the machine. What kind of situation does this actually benefit you in?
评论 #31076475 未加载
ComradePhilabout 3 years ago
This is a well-known mode of attack and some anti-virus software have protections against it: <a href="https:&#x2F;&#x2F;www.kaspersky.com&#x2F;blog&#x2F;weaponized-usb-devices&#x2F;26495&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.kaspersky.com&#x2F;blog&#x2F;weaponized-usb-devices&#x2F;26495&#x2F;</a>
评论 #31075914 未加载
评论 #31075964 未加载
riveduchaabout 3 years ago
Even better, why not find people with a wireless mouse&#x2F;kbd dongle plugged into their computer, then send radio signals mimicking their mouse&#x2F;kbd to do the same thing? That way you don&#x27;t even need to touch their computer or bypass the check on whether the USB device is preauthorized.<p>The reason you can&#x27;t is because many newer wireless devices have encryption, but how many people know or care when they buy one?<p>I spent a not insignificant amount of time looking into this, but for the purpose of making a game AI, not for hacking other people&#x27;s computers.
sydthrowawayabout 3 years ago
What stops this on Mac?
joeld42about 3 years ago
Nothing, really.