Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

Other USB Exploits

The smart device’s vulnerability lies in the handshake between the USB port and the device when it is connected. Among other things, this handshake determines what the plugged-in device is. For example, a rogue USB device might claim to be a human interface device such as a keyboard, at which point all keystroke information typed on the infected PC will be forwarded to the connected USB device. Called a keylogger, this exploit is common on both fixed and wireless peripherals. This attack is often deployed in hotel business lounges, where an attacker plugs a USB key into a PC used by dozens of people to check various accounts. This works because very few people think to look at what is physically connected to the machine they ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733