Aug. 8, 2022, 7:31 p.m. | Hak5

Hak5 www.youtube.com

Keystroke Reflection exploits the de facto standard keyboard-computer architecture implemented by all IBM-PC compatibles since 1984 and adopted in USB-HID to provide a SIDE-CHANNEL Exfiltration pathway that impacts nearly all personal computers from the last 4 decades.

Learn more: https://shop.hak5.org/pages/keystroke-reflection
Get a USB Rubber Ducky: https://usbrubberducky.com

channel exfiltration rubber ducky side-channel usb

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Associate Manager, BPT Infrastructure & Ops (Security Engineer)

@ SC Johnson | PHL - Makati

Cybersecurity Analyst - Project Bound

@ NextEra Energy | Jupiter, FL, US, 33478

Lead Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts

Junior Information Security Coordinator (Internship)

@ Garrison Technology | London, Waterloo, England, United Kingdom

Sr. Security Engineer

@ ScienceLogic | Reston, VA