Results 1 to 3 of 3

Thread: malicious HID

  1. #1
    Registered User
    Join Date
    Jul 2007
    Posts
    61
    Blog Entries
    1

    malicious HID

    just want to share a reading that captivated me for a while.

    Code:
    http://pentest.snosoft.com/2011/06/24/netragards-hacker-interface-device-hid/
    i've never really found a bit unique implementation like this, suggesting hardware and software skill indeed.

  2. #2
    Holy O shit.........

    That is fucking brilliant .

    Woodmann
    Learn Or Die.

  3. #3
    ...fuck you guys, I simply couldnt resist after the read and already started to build my evil HID -.-

    I'd be roasting on the beach in my free time instead of playing with solders and MCs...


    ... oh well
    I want to know God's thoughts ...the rest are details.
    (A. Einstein)
    --------
    ..."a shellcode is a command you do at the linux shell"...

Similar Threads

  1. Obfuscated shellcode inside a malicious RTF document
    By My Infected Computer in forum Blogs Forum
    Replies: 0
    Last Post: March 6th, 2014, 12:45
  2. Help analyzing a malicious PDF
    By Sunk in forum Malware Analysis and Unpacking Forum
    Replies: 1
    Last Post: August 8th, 2011, 15:20
  3. Redundant Checking & malicious consequences
    By dzzie in forum Malware Analysis and Unpacking Forum
    Replies: 4
    Last Post: August 27th, 2001, 22:15

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •