Analysis of Various Malicious Payload Deployment Cables
نویسندگان
چکیده
Cybercriminals and hackers are always thinking of clever, new ways to exploit your devices you must be perpetually vigilant. A malicious cable is any (electrical or optical) which performs an unexpected, unwanted function. The most common capabilities found in USB cables. Data exfiltration, GPS tracking, audio eavesdropping the primary functions. worst cables take control a user’s cell phone, laptop, desktop. Usernames passwords first bits go. Next, connected device’s storage emptied. Attacks through various computer ports such as Ethernet Port, if targeted network contains faulty (networking) on attacker's path their victim. This project gives broad overview comparative study list vulnerabilities hardware that can exploited by attackers using payloads. Keywords— malicious, payloads, data infiltration, cables, ethernet HDMI
منابع مشابه
Automatic Payload Deployment System
The ability to precisely emplace stand-alone payloads in hostile territory has long been on the wish list of US warfighters. This type of activity is one of the main functions of special operation forces, often conducted at great danger. Such risk can be mitigated by transitioning the manual placement of payloads over to an automated placement mechanism by the use of the Automatic Payload Deplo...
متن کاملRemote Extraction of Malicious Payload for Sctp
The Stream Control Transmission Protocol (SCTP) is a message oriented reliable transport layer protocol which uses four way handshake mechanism. It is more robust than TCP, which provides delivery of data between two end points, and message boundaries preservation as in UDP. Additionally it has advantage such as multihoming and multi streaming. These features increase the availability of data c...
متن کاملAndroid Malware Clustering Through Malicious Payload Mining
Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party libraries in Android application development and the widespread use of repackaging in malware development. We design and implement an Android ma...
متن کاملDevelopment of Fibers Optic Cables for Permanent Geothermal Wellbore Deployment
The use of fiber optics within geothermal wells has been extremely limited. The high-temperatures and formation of molecular hydrogen within the well have resulted in the early death of fiber optic cables. This paper reveals reasons for hope to extend the life of fibers for many years. Various fibers have been evaluated for degradation when exposed to ambient molecular hydrogen. Two commerciall...
متن کاملA Modular Design Approach for the Automatic Payload Deployment System
The ability to emplace stand-alone payloads in hostile territory has long been on the wish list of US warfighters. This type of activity is often conducted at great danger. We have developed a capability for automated payload placement from unmanned ground vehicles (UGVs) using the Automatic Payload Deployment System (APDS) that can greatly reduce this danger. For example, payloads equipped wit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Scientific Journal Of Research In Engineering And Management
سال: 2023
ISSN: ['2582-3930']
DOI: https://doi.org/10.55041/ijsrem24367