![]() ![]() Hence, while the current state of affairs on Windows is that the OS will not by design run malicious code automatically, it may still do it by mistake. Any phase of that process could have exploitable bugs, and indeed numerous examples of these have historically occurred (for instance, the PS3 Jailbreak from last year is a USB device which, internally, announces itself as a hub of four devices, one of which rambling incoherently on the USB bus in such a way that it triggers a buffer overflow in the OS USB driver). ![]() Depending on what files were found and their name, the OS will suggest a choice of actions to the user (that's the popup you see). Then, if the device says that it is a kind of disk, the OS will look for a filesystem on it, then mount it, and explore some of the files. The OS first talks to the USB device to know what kind of device it is and what it can do. When you plug a USB key in, a considerable amount of things happen. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |