[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1345620620.49371.YahooMailNeo@web122406.mail.ne1.yahoo.com>
Date: Wed, 22 Aug 2012 00:30:20 -0700 (PDT)
From: Herald Gibson <heraldgibson@...ketmail.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: USB HID attacks on Mac OS X
All,
Kautilya has been updated to include attacks on Mac OS X and some new nifty payloads on other OS as well. Details here
http://labofapenetrationtester.blogspot.com/2012/08/kautilya-03-released-breaking-mac-os-x.html
I use this in my Social Engg. attacks and is quite successful in many pen tests. Have a look.
Also, the reason for posting this to FD is to ask that how many of you use this type of attack vector in real life pen tests?If yes, how do you use this?
Cheers,
Herald
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists