![]() Similarly, a Rubber Ducky can be configured to record keystrokes when logging into any platform. They could quickly steal data that we have stored on the computer and without us immediately noticing this problem. Personal information may be at risk if we mistakenly connect a memory of these characteristics. You can have a script that copies certain files and information that are in Windows, for example, simply when the victim connects it to a corresponding USB port. Of course, through a Rubber Ducky the attacker will be able to steal the victim’s personal information and content that is hidden in the system. You can configure what is known as a back door, similar to a Trojan. ![]() ![]() This will allow a third party, without needing to be physically there, to take control of the computer and manipulate it however they want. This device can open a link between the monitoring server and the victim’s system. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |