Summary

After finishing this chapter, the reader now has a solid understanding of what injectable devices are, how they work, and how to identify USB vulnerabilities. It is important to remember the technical aspects of USB technology, so you can get a better understanding of its vulnerabilities. This chapter also discussed what a Rubber Ducky is and how it's used. The reader should now be familiar with the format of Rubber Ducky scripts and how to encode the Ducky payloads. It is recommended, if you use a Rubber Ducky, to exercise caution and responsibility at all times. This is a powerful tool that should be treated with respect. We strongly discourage using the knowledge we have provided throughout this chapter for any illegal or malicious activity. The KeyGrabber is also a tool that should always be used responsibly. This chapter provided an excellent defense method against injectable devices, by disabling USB ports. We ended the chapter discussing the glitch. As we discussed earlier, the glitch is another payload injection tool. Having knowledge on these tools will help the reader advance their skills in cyber security. In Chapter 14, The Internet of Things, we will focus on the Internet of Things. We will discuss what IoT is, how it functions, its vulnerabilities, and overall impact on cyber security.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.27.58