10:27
0
usb

USB a small secondary device can do much more than anyone can think of. It can be converted into hacking device when a small program resides on it is capable of capturing and copy sensitive information of one's computer where it is plugged.



Now what are those small programs which can do these tasks smartly without any clue behind.

1. USB Dumper:- 

usb dumper
1. Put USB dumper in your USB Drive
2. Browse drive to dump
3. Select copy
4. Add and start dumping

As it is GUI Tool you can easily work with it. It silently copies all the information to your USB drive. Use USB dumper 2.2 for good results.

2. USB Switch blades:-

it contains a malicious program code that steals sensitive information from windows system such as passwords, Hashes , IP address Information , cookies etc and also create the backdoor to the system for next time access.
It can be used easily if attacker has physical access to target system. He need to plug USB switch blade on victim pc.This uses windows autorun program to  steal information. If autorun feature is OFF it won't work.  One Important thing is that it cant be detected by any antivirus program.

0 comments:

Post a Comment