Posted by Rodrigo Menezes on Jan 08
Many of us have now been long aware of the possibility of programming an USB device to emulate a keyboard and
automatically send keystrokes in order to perform malicious actions on a computer. Some of the most interesting
payloads that can be used with this technique are based around downloading or creating an executable file and then
running it.
However, defenses such as Windows’ User Account Control (UAC) and SmartScreen might make…