4.8 Summary - UA

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

2 hours 25 minutes
Video Transcription
So what we learned in this lab we learned quite a bit about H i. D. Smoothing devices. I showed you how the USB River ducky works physically and how you need to encode payloads and move them via the adapter withy. My crusty card.
Then I taught you ducky script, and I showed you how it can do anything a keyboard could. D'oh.
Then we learned how to build the tax with the USB rubber ducky and how it's really important to do your testing in order to troubleshoot in case there's a problem. Because nine times out of 10 you will have a problem. So you need to test. Okay, so up next now we're going to do are malicious file slash code lab.
Up Next
USB Drop Attack

Malicious devices are everywhere these days, whether you can see them or not.

Instructed By