Difference between revisions of "Key Stroke Injection"
Jump to navigation
Jump to search
Line 39: | Line 39: | ||
Duckhunt - Windows Defender | Duckhunt - Windows Defender | ||
https://medium.com/@maarten.goet/defending-against-weaponized-hardware-windows-defender-atp-microsoft-intune-to-the-rescue-80aba28067fe | https://medium.com/@maarten.goet/defending-against-weaponized-hardware-windows-defender-atp-microsoft-intune-to-the-rescue-80aba28067fe | ||
http://konukoii.com/blog/2016/10/26/duckhunting-stopping-automated-keystroke-injection-attacks/ | |||
== References == | == References == |
Revision as of 12:58, 12 May 2020
Summary
Description what this documentation is about
Usage
Text here
Automation
Text here
Penetration Testing
Text here
Hacking
Text here
Tools
Text here
- Rubber Ducky
Text here
- Pocket Admin
https://www.electronics-lab.com/project/pocketadmin-keystroke-injection-device/
- USB Ninja
- Bash Bunny
https://shop.hak5.org/products/bash-bunny
Possible Protections
Text here
https://opensource.googleblog.com/2020/03/usb-keystroke-injection-protection.html
Duckhunt - Windows Defender
https://medium.com/@maarten.goet/defending-against-weaponized-hardware-windows-defender-atp-microsoft-intune-to-the-rescue-80aba28067fe http://konukoii.com/blog/2016/10/26/duckhunting-stopping-automated-keystroke-injection-attacks/