So, I was reading an article which described how a penetration testing company managed to get past a firewall by posting an employee a specially rigged mouse! The idea was that my embedding a micro-controller in the mouse which could be programmed to disable the virus protection on a computer and then load some Trojan vector. The real difference in this design was that it didn't depend on a USB memory stick and autoload, it used HID keyboard commands instead.
Share this post
Hardware Trojan Devices
Share this post
So, I was reading an article which described how a penetration testing company managed to get past a firewall by posting an employee a specially rigged mouse! The idea was that my embedding a micro-controller in the mouse which could be programmed to disable the virus protection on a computer and then load some Trojan vector. The real difference in this design was that it didn't depend on a USB memory stick and autoload, it used HID keyboard commands instead.