When you have physical access to a machine, assume it is compromised
Posted by jpluimers on 2020/02/24
When you have physical access to a machine, assume it is compromised.
Sometimes the compromise can be as simple as a HID device access:
- [WayBack] GitHub – mame82/P4wnP1: P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.
- [WayBack] Reverse SSH tunnel – P4wnP1 Official Wiki
–jeroen
Leave a Reply