Mike Ritland
๐ค SpeakerAppearances Over Time
Podcast Appearances
There's so many ways because in a red team scenario, you don't know what you're up against and you're going to need some options to circumvent a problem. But yeah, still, what does it even do? You're connected to it. But it primarily emulates a keyboard. It says, I'm a keyboard, and it types really fast. So what does that do? Literally anything I could do sitting at the computer at the keyboard.
There's so many ways because in a red team scenario, you don't know what you're up against and you're going to need some options to circumvent a problem. But yeah, still, what does it even do? You're connected to it. But it primarily emulates a keyboard. It says, I'm a keyboard, and it types really fast. So what does that do? Literally anything I could do sitting at the computer at the keyboard.
There's so many ways because in a red team scenario, you don't know what you're up against and you're going to need some options to circumvent a problem. But yeah, still, what does it even do? You're connected to it. But it primarily emulates a keyboard. It says, I'm a keyboard, and it types really fast. So what does that do? Literally anything I could do sitting at the computer at the keyboard.
So whether that's implanting malware or whatever it may be, right? That's kind of the basic functionality of it. But, I mean, it's not it. USB cables can often connect a keyboard to a computer when you're sitting at a desk. Swap out that cable, and this can now intercept the keystrokes, which is really good.
So whether that's implanting malware or whatever it may be, right? That's kind of the basic functionality of it. But, I mean, it's not it. USB cables can often connect a keyboard to a computer when you're sitting at a desk. Swap out that cable, and this can now intercept the keystrokes, which is really good.
So whether that's implanting malware or whatever it may be, right? That's kind of the basic functionality of it. But, I mean, it's not it. USB cables can often connect a keyboard to a computer when you're sitting at a desk. Swap out that cable, and this can now intercept the keystrokes, which is really good.
Just like one classic use case is if the machine is locked, I mean, you can type all you want, but you're at a lock screen. You need to get past the lock screen. What do you need to get past the lock screen? You need the password, right? How do you get the password? There's a lot of ways. I mean, you could call up the person and effectively ask them for it by saying, I'm IT or something like that.
Just like one classic use case is if the machine is locked, I mean, you can type all you want, but you're at a lock screen. You need to get past the lock screen. What do you need to get past the lock screen? You need the password, right? How do you get the password? There's a lot of ways. I mean, you could call up the person and effectively ask them for it by saying, I'm IT or something like that.
Just like one classic use case is if the machine is locked, I mean, you can type all you want, but you're at a lock screen. You need to get past the lock screen. What do you need to get past the lock screen? You need the password, right? How do you get the password? There's a lot of ways. I mean, you could call up the person and effectively ask them for it by saying, I'm IT or something like that.
But if you're deployed between a keyboard, you can just... pull it right off the lines. They're going to type that password every single time they log into the computer.
But if you're deployed between a keyboard, you can just... pull it right off the lines. They're going to type that password every single time they log into the computer.
But if you're deployed between a keyboard, you can just... pull it right off the lines. They're going to type that password every single time they log into the computer.
You remotely see that, you rebuild a new payload that maybe when they go to lunch in the evening, when you know they're not at the machine anymore, it's just going to type in that password, automatically unlock the machine, and then do all the nefarious things you wanted to at that point.
You remotely see that, you rebuild a new payload that maybe when they go to lunch in the evening, when you know they're not at the machine anymore, it's just going to type in that password, automatically unlock the machine, and then do all the nefarious things you wanted to at that point.
You remotely see that, you rebuild a new payload that maybe when they go to lunch in the evening, when you know they're not at the machine anymore, it's just going to type in that password, automatically unlock the machine, and then do all the nefarious things you wanted to at that point.
Yeah, not so much seeing. There's a lot of, it depends, right?
Yeah, not so much seeing. There's a lot of, it depends, right?
Yeah, not so much seeing. There's a lot of, it depends, right?
Not at this stage. So at this stage, we're just blindly sending keystrokes in, right? So as long as you know what OS it is or something like that, that's all you need on a desktop. I know if I hit Command Space, it's going to open up Spotlight on a Mac. And then I can open up Chrome and then go to the address bar, do some things, right? For example.
Not at this stage. So at this stage, we're just blindly sending keystrokes in, right? So as long as you know what OS it is or something like that, that's all you need on a desktop. I know if I hit Command Space, it's going to open up Spotlight on a Mac. And then I can open up Chrome and then go to the address bar, do some things, right? For example.