Metasploit for mac sierra

broken image

USB devices must identify what device they are to the OS, a USB stick with malicious firmware could pretend to be a keyboard and send fake keystrokes that open a command prompt and install a backdoor, for example. There are many ways USB devices can attack your machine.

broken image

You should always avoid plugging in untrusted USB devices. Tl dr: paranoid that coworker gave me a USB thumbdrive with metasploit exploit for macos, how to best detect? I now have to wonder if a coworker gave me a USB loaded with an exploit. I use one of my own USB thumbdrives, and it goes OK. The copy command freezes over a span of 30 minutes. I quip 'huh, playing around with metasploit lately?' Him: 'Ya, '.

broken image

Thumbdrive has almost nothing but a '.metasploit' directory on it. It's 2GB, so let's throw it on a USB thumbdrive. Same coworker asks for data from me today.

broken image

How he took care of it with his buddy by picking a lock, and installing malware and backdoors on the other student's computer. I don't know how to put this lightly, so I can only put this as it is.Ī coworker who's had a beef with me, told me today how he had a problem with another student back in college.