Flutterby™! : USB NTFS exploit

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

USB NTFS exploit

2012-10-23 16:14:37.726661+02 by Dan Lyke 2 comments

[ related topics: Microsoft ]

comments in descending chronological order (reverse):

#Comment Re: made: 2012-10-24 00:50:44.888565+02 by: Dan Lyke

This is similar in that it doesn't use autorun, but it also allows you to put escalated code on the target machine.

#Comment Re: made: 2012-10-24 00:26:50.022818+02 by: meuon

Irongeek USB HID hack See section 2.5:

The advantage of a USB HID for these sorts of functions over a U3 flash drive is that with a USB HID it does not matter if autorun is disabled or not. By default, most operating systems seem to automatically install and configure USB HIDs as soon as they are inserted, regardless of the privilege level of the current user.

Comment policy

We will not edit your comments. However, we may delete your comments, or cause them to be hidden behind another link, if we feel they detract from the conversation. Commercial plugs are fine, if they are relevant to the conversation, and if you don't try to pretend to be a consumer. Annoying endorsements will be deleted if you're lucky, if you're not a whole bunch of people smarter and more articulate than you will ridicule you, and we will leave such ridicule in place.


Flutterby™ is a trademark claimed by

Dan Lyke
for the web publications at www.flutterby.com and www.flutterby.net.