Analysis of Various Malicious Payload Deployment Cables

نویسندگان

چکیده

Cybercriminals and hackers are always thinking of clever, new ways to exploit your devices you must be perpetually vigilant. A malicious cable is any (electrical or optical) which performs an unexpected, unwanted function. The most common capabilities found in USB cables. Data exfiltration, GPS tracking, audio eavesdropping the primary functions. worst cables take control a user’s cell phone, laptop, desktop. Usernames passwords first bits go. Next, connected device’s storage emptied. Attacks through various computer ports such as Ethernet Port, if targeted network contains faulty (networking) on attacker's path their victim. This project gives broad overview comparative study list vulnerabilities hardware that can exploited by attackers using payloads. Keywords— malicious, payloads, data infiltration, cables, ethernet HDMI

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automatic Payload Deployment System

The ability to precisely emplace stand-alone payloads in hostile territory has long been on the wish list of US warfighters. This type of activity is one of the main functions of special operation forces, often conducted at great danger. Such risk can be mitigated by transitioning the manual placement of payloads over to an automated placement mechanism by the use of the Automatic Payload Deplo...

متن کامل

Remote Extraction of Malicious Payload for Sctp

The Stream Control Transmission Protocol (SCTP) is a message oriented reliable transport layer protocol which uses four way handshake mechanism. It is more robust than TCP, which provides delivery of data between two end points, and message boundaries preservation as in UDP. Additionally it has advantage such as multihoming and multi streaming. These features increase the availability of data c...

متن کامل

Android Malware Clustering Through Malicious Payload Mining

Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party libraries in Android application development and the widespread use of repackaging in malware development. We design and implement an Android ma...

متن کامل

Development of Fibers Optic Cables for Permanent Geothermal Wellbore Deployment

The use of fiber optics within geothermal wells has been extremely limited. The high-temperatures and formation of molecular hydrogen within the well have resulted in the early death of fiber optic cables. This paper reveals reasons for hope to extend the life of fibers for many years. Various fibers have been evaluated for degradation when exposed to ambient molecular hydrogen. Two commerciall...

متن کامل

A Modular Design Approach for the Automatic Payload Deployment System

The ability to emplace stand-alone payloads in hostile territory has long been on the wish list of US warfighters. This type of activity is often conducted at great danger. We have developed a capability for automated payload placement from unmanned ground vehicles (UGVs) using the Automatic Payload Deployment System (APDS) that can greatly reduce this danger. For example, payloads equipped wit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Scientific Journal Of Research In Engineering And Management

سال: 2023

ISSN: ['2582-3930']

DOI: https://doi.org/10.55041/ijsrem24367