Black Hills InfoSec - Executing Keyboard Injection Attacks
Ray Felch // Preface: Following the work of the Bastille Research Group (See: https://ift.tt/2t1bo2o), I was interested in knowing if these (keyboard injection) vulnerabilities were still valid. To my surprise, I was able to duplicate the attack on an inexpensive Logitech keyboard that I already had in my possession. This keyboard (Logitech K400r) is still […]
The post Executing Keyboard Injection Attacks appeared first on Black Hills Information Security.
from Black Hills Information Security https://www.blackhillsinfosec.com/executing-keyboard-injection-attacks/
Comments
Post a Comment