Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Attacker has only access to USB port and can either attach a device or pen-drive

ID: 657854 • Letter: A

Question

Attacker has only access to USB port and can either attach a device or pen-drive to a computer, that can be on or off. Imagine a scenario where non-reliable people have access to offices, either because they clean after-hours (off scenario) or because they sit near the running computer (on scenario) but only that, what is the risk to this computer? Could you connect a pen-drive to it when the computer is turned off and run some malicious software on it? If the computer is running, can you connect a cable to this USB port and extract some information?

Explanation / Answer

If a USB port was available, any attack could potentially trick the computer into believing a small plug was a keyboard, making it possible to save and run scripts on the computer.

They could also run a program on your computer by using the Autorun feature on your computer, although that feature could also be disabled.

Practically anything can be done, but it's dependent on whether or not the computer will allow it to be done.