Instead it acts as a pass-through, keeping track of the keystrokes but also listening for a three-key unlock code. The logger doesn’t enumerate when plugged in. ![]() They wanted one to test with before taking on the actual target. He ended up brute forcing an unlock code to access the device, but not before taking some careful steps along the way.įrom the design and placement the hardware was most likely a key logger and after some searching around the Internet and his colleagues ordered what they thought was the same model of device. was hired by the company to figure out what it is and what kind of damage it may have done. The USB device seen plugged in on the right of this image was found in between the keyboard and USB port of the company computer belonging to a Senior Executive.
0 Comments
Leave a Reply. |