Black Hills InfoSec - Executing Keyboard Injection Attacks

Ray Felch // Preface: Following the work of the Bastille Research Group (See: https://ift.tt/2t1bo2o), I was interested in knowing if these (keyboard injection) vulnerabilities were still valid. To my surprise, I was able to duplicate the attack on an inexpensive Logitech keyboard that I already had in my possession. This keyboard (Logitech K400r) is still […]

The post Executing Keyboard Injection Attacks appeared first on Black Hills Information Security.



from Black Hills Information Security https://www.blackhillsinfosec.com/executing-keyboard-injection-attacks/

Comments

Popular posts from this blog

Krebs - NY Charges First American Financial for Massive Data Leak

KnowBe4 - Scam Of The Week: "When Users Add Their Names to a Wall of Shame"