- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 115字
- 2021-07-02 12:38:26
HID attacks
A Human Interface Device (HID) attack converts a Kali NetHunter device, such as a smartphone with on-the-go (OTG) support, into a pre-programmed keyboard. If a penetration tester uses an OTG cable to create a physical connection between the Kali NetHunter device and a target computer, NetHunter has the capabilities of creating an attack vector. The vector uses a combination of the phone’s hardware and software to create a pre-programmed keyboard. The purpose of the pre-programmed keyboard is to inject script attacks into the target system.
According to the official documentation on Kali NetHunter, USB HID attacks are only available on Teensy devices. Teensy devices can be found at https://www.pjrc.com/teensy/.
推薦閱讀
- Android應用安全實戰:Frida協議分析
- 網絡安全與管理
- 白話網絡安全2:網安戰略篇
- unidbg逆向工程:原理與實踐
- 計算機網絡安全技術(第6版·慕課版)
- 代碼審計:企業級Web代碼安全架構
- Testing and Securing Android Studio Applications
- 物聯網安全滲透測試技術
- Kerberos域網絡安全從入門到精通
- 人工智能安全(精裝版)
- End to End GUI Development with Qt5
- 信息技術基礎:提高篇·實驗與習題
- 物聯網信息安全技術
- Developing Applications with Salesforce Chatter
- Web前端黑客技術揭秘