top | item 41825979

(no title)

forgot-im-old | 1 year ago

PocketAdmin is capable of all that's described here and it's open source! https://github.com/krakrukra/PocketAdmin

discuss

order

yellow_lead|1 year ago

I don't think so.

> Next, the infected computer infects any external drives that get inserted. When the infected drive is plugged into an air-gapped system, it collects and stores data of interest. Last, when the drive is inserted into the Internet-connected device, the data is transferred to an attacker-controlled server.

This implies the ability to turn a common USB drive into a vector for malware.

forgot-im-old|1 year ago

PocketAdmin can be both a HID storage device and a keyboard.