mozz Admin , (edited )
mozz avatar

Yeah. It was pretty interesting to hear the details of pretending to be a HID device and how you could use it in practice to make malicious changes to the host computer. But surely adding to /etc/hosts is not the most preferred sneaky thing you can do with your unrestricted access.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • netsec@lemmy.world
  • test
  • worldmews
  • mews
  • All magazines