Cart 0
HOPE Number Nine (2012): "HIDIOUS Methods of Keystroke Injection" (Download)

HOPE Number Nine (2012): "HIDIOUS Methods of Keystroke Injection" (Download)

  • 099

Friday, July 13, 2012: 5:00 pm (Nutt): It's amazing what can be accomplished with just a few keystrokes. Changing user passwords, formatting disks, and scanning a network are each one command away in most modern operating systems. What if you had two minutes of access on a system? Is this enough time to accomplish information gathering or exploitation on even the most hardened system? It just might be. Through a combination of software and hardware, hundreds of keystrokes a minute can be flawlessly injected into any computer to gain control of system resources. The HIDIOUS (HID Injection Over USB Suite) allows for easy configuration of keyboard/mouse injection attacks through USB.

Hosted by JP Dunning