diff --git a/Home.rdoc b/Home.rdoc index 1d29c7f..0523d0e 100644 --- a/Home.rdoc +++ b/Home.rdoc @@ -4,7 +4,7 @@ http://cdn.shopify.com/s/files/1/0068/2142/products/duck5_medium.jpg ====About -Following the success of the [[http://hak5.org/usb-switchblade|USB Switchblade]], the attack platform that was super effective against local Windows targets, the [[http://www.hak5.org|Hak5]] community with the help of [[http://www.appliedsec.com/|Applied Security]] has developed a new kind of attack -- this time cross platform (Windows, Mac, Linux) -- which achieves deadly results by posing as an ubiquitous keyboard. +Following the success of the [USB Switchblade](http://hak5.org/usb-switchblade), the attack platform that was super effective against local Windows targets, the [Hak5](http://www.hak5.org) community has developed a new kind of attack -- this time cross platform (Windows, Mac, Linux) -- which achieves deadly results by posing as an ubiquitous keyboard. The USB Rubber Ducky isn't your ordinary [[http://en.wikipedia.org/wiki/Human_interface_device|HID (Human Interface Device)]]. Coupled with a powerful 60 MHz 32-bit processor and a simple scripting language anyone is able to craft payloads capable of changing system settings, opening back doors, retrieving data, initiating reverse shells, or basically anything that can be achieved with physical access -- all automated and executed in a matter of seconds.