Host deployment

One advantage that the NetHunter platform has over the Kali Linux platform is the native USB support found in the Android OS. This gives a penetration tester the ability to connect the NetHunter platform directly to hosts such as laptops and desktops. This ability allows the penetration tester to utilize tools that carry out human interface device attacks. In these attacks, the penetration tester is able to leverage tools that allow for connection to host devices and mimic what are known as Human Interface Devices (HIDs). HIDs are devices such as keyboards and mice that connect to the host via USB.

HID attacks use this feature to force the host system to perform commands or to download payload scripts directly to the system. What makes this attack significantly more difficult to stop is that event with data loss prevention controls that do not allow USB storage devices to connect, HID devices are allowed.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.131.178