Skip to Content
Applied Network Security
book

Applied Network Security

by Warun Levesque, Arthur Salmon, Michael McLafferty
April 2017
Intermediate to advanced
350 pages
8h 35m
English
Packt Publishing
Content preview from Applied Network Security

Summary

After finishing this chapter, the reader now has a solid understanding of what injectable devices are, how they work, and how to identify USB vulnerabilities. It is important to remember the technical aspects of USB technology, so you can get a better understanding of its vulnerabilities. This chapter also discussed what a Rubber Ducky is and how it's used. The reader should now be familiar with the format of Rubber Ducky scripts and how to encode the Ducky payloads. It is recommended, if you use a Rubber Ducky, to exercise caution and responsibility at all times. This is a powerful tool that should be treated with respect. We strongly discourage using the knowledge we have provided throughout this chapter for any illegal or malicious ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Applied Network Security Monitoring

Applied Network Security Monitoring

Chris Sanders, Jason Smith
Network Protocols for Security Professionals

Network Protocols for Security Professionals

Yoram Orzach, Deepanshu Khanna
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781786466273