Difference between revisions of "Key Stroke Injection"
Jump to navigation
Jump to search
(→Tools) |
|||
Line 30: | Line 30: | ||
* Bash Bunny | * Bash Bunny | ||
https://shop.hak5.org/products/bash-bunny | https://shop.hak5.org/products/bash-bunny | ||
* Standard Hardware | |||
many sources in internet show manipulated peripheral devices with built in keystroke injection hardware/software | |||
== Possible Protections == | == Possible Protections == |
Revision as of 13:01, 12 May 2020
Summary
Description what this documentation is about
Usage
Text here
Automation
Text here
Penetration Testing
Text here
Hacking
Text here
Tools
Text here
- Rubber Ducky
Text here
- Pocket Admin
https://www.electronics-lab.com/project/pocketadmin-keystroke-injection-device/
- USB Ninja
- Bash Bunny
https://shop.hak5.org/products/bash-bunny
- Standard Hardware
many sources in internet show manipulated peripheral devices with built in keystroke injection hardware/software
Possible Protections
Text here
https://opensource.googleblog.com/2020/03/usb-keystroke-injection-protection.html
Duckhunt - Windows Defender
https://medium.com/@maarten.goet/defending-against-weaponized-hardware-windows-defender-atp-microsoft-intune-to-the-rescue-80aba28067fe http://konukoii.com/blog/2016/10/26/duckhunting-stopping-automated-keystroke-injection-attacks/