this post was submitted on 20 Feb 2024
34 points (97.2% liked)
netsec
1236 readers
1 users here now
Technical news and discussion of information security.
Rules:
- Be excellent to each other
- Keep it on topic
- Absolutely no PII or doxing
- No disclosure posts
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Yeah. It was pretty interesting to hear the details of pretending to be a HID device and how you could use it in practice to make malicious changes to the host computer. But surely adding to /etc/hosts is not the most preferred sneaky thing you can do with your unrestricted access.