Penetration testing devices
A rubber ducky looks like a normal USB stick but can be used for malicious purposes by threat actors. A Rubber Ducky can be used to conduct various tasks such as obtain passwords as well as transfer files between machines to further compromise your laptop/desktop. Even if USB devices are blocked on the computer, a[…]