Today’s increasingly miniaturized world is giving rise to all sorts of hardware devices that can hack almost any computer, device, or network. Plug in an item the size of a USB stick and all your hard-won protections could be defeated.
If you haven’t been paying attention to this field of attack, what you learn might shock you.Anyone can create or buy a computer with an operating system that fits in a space smaller than a postage stamp. Most of these have physical USB interfaces, but many are wireless or have interchangeable interfaces.
These devices include the following:
Computers on a stick
Keyboard man-in-the-middle intercept devices
Plug-in hacking devices
[ Also from InfoWorld: The 10 Windows group policy settings you need to get right. | Survive and thrive with the new OS: The ultimate Windows 10 survivor kit. | Stay up on key Microsoft technologies with the Windows newsletter. ]
In the interest of defending against this new threat, let’s take a close look at one of the most versatile and popular hardware hacking devices: Bash Bunny by Hak5.
I’m offering considerable detail here to show how easy it is to launch malicious attacks that bypass network defenses—and to help white hats who may wish to use the device for simulated red team attacks.To read this article in full or to leave a comment, please click here