Other USB Exploits
The smart device’s vulnerability lies in the handshake between the USB port and the device when it is connected. During the handshake, the plugged-in device declares its device type to the system, which the system must blindly accept since there is no way to verify the USB’s claim. For example, a rogue USB device might claim to be a human interface device, such as a keyboard, at which point all keystroke information typed on the infected PC will be forwarded to the connected USB device. Called a keylogger, this exploit is common on both fixed and wireless peripherals. This attack is often deployed in hotel business lounges, where an attacker plugs a USB key into a PC used by dozens of people to check various accounts. This ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access