Today’s increasingly miniaturized world is giving rise to all sorts of hardware devices that can hack almost any computer, device, or network. Plug in an item the size of a USB stick and all your hard-won protections could be defeated. If you haven’t been paying attention to this field of attack, what you learn might shock you.

Anyone can create or buy a computer with an operating system that fits in a space smaller than a postage stamp. Most of these have physical USB interfaces, but many are wireless or have interchangeable interfaces. These devices include the following:

  • Computers on a stick
  • Keyboard man-in-the-middle intercept devices
  • Wireless computers
  • Plug-in hacking devices

In the interest of defending against this new threat, let’s take a close look at one of the most versatile and popular hardware hacking devices: Bash Bunny by Hak5. I’m offering considerable detail here to show how easy it is to launch malicious attacks that bypass network defenses—and to help white hats who may wish to use the device for simulated red team attacks.

To read this article in full or to leave a comment, please click here

Source: Security