Hi,
I was looking in exploit-db for such a vulnerability but I wasn't even sure how it is called: The way it should work is that I put specifically crafted data on my USB so that when it is connected to a PC, the PC runs a certain payload I choose without users knowledge.
How is this class of vulnerabilities called? Do you have an example for such a vulnerability? (No matter how old, preferably from exploit-db)
Thanks!
[link] [comments]
from hacking: security in practice https://ift.tt/3jwi3OX
Comments
Post a Comment