Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attackChewy@discuss.tchncs.de to Linux@lemmy.ml – 346 points – 11 months agoarstechnica.com98Post a CommentPreviewYou are viewing a single commentView all commentsOn Linux/Mac you have no use sudo. For sudo you need a password. This thing will make it very easy to make a rubber ducky though.Would be pretty easy to pull off if you had hardware access. Just boot from a flash drive and drop the exploit from there. Even if their OS is full disk encrypted, this can easily inject a backdoor or just keylog the bootup password prompt.1 more...
On Linux/Mac you have no use sudo. For sudo you need a password. This thing will make it very easy to make a rubber ducky though.Would be pretty easy to pull off if you had hardware access. Just boot from a flash drive and drop the exploit from there. Even if their OS is full disk encrypted, this can easily inject a backdoor or just keylog the bootup password prompt.1 more...
Would be pretty easy to pull off if you had hardware access. Just boot from a flash drive and drop the exploit from there. Even if their OS is full disk encrypted, this can easily inject a backdoor or just keylog the bootup password prompt.
On Linux/Mac you have no use sudo. For sudo you need a password.
This thing will make it very easy to make a rubber ducky though.
Would be pretty easy to pull off if you had hardware access. Just boot from a flash drive and drop the exploit from there.
Even if their OS is full disk encrypted, this can easily inject a backdoor or just keylog the bootup password prompt.