There are many ways. A simple way is to simulate a USB hub with an input device and a usb drive. You use the input device to execute whatever is on the drive. Another way is to identify as a device whose driver has some vulnerability. Windows auto-installs that driver, then you exploit it.
PMunch|1 year ago
mu53|1 year ago
Once you can manipulate the code on the firmware, its probably pretty easy to find a kernel level exploit.
Here is a reference with a virus. https://superuser.com/questions/854918/manipulating-firmware...
codetrotter|1 year ago
Yea but that has to be a custom or specific kind of programmable USB device. Or one that somehow unintentionally allows you to reflash its firmware to something else.
And also if anyone ever plugs your malicious USB device into a Mac, they will get a pop-up from macOS that asks you to identify the keyboard. Although maybe if it fakes a specific USB keyboard that macOS knows out of the box, you could avoid that?
zahlman|1 year ago