Researchers from the Ben-Gurion University of the Negev in Israel have identified 29 ways in which attackers could use USB devices to compromise users' computers.
The research team has classified these 29 exploitation methods in four different categories, depending on the way the attack is being carried out.
Reprogrammable microcontroller USB attacks
1)
Rubber Ducky - a commercial keystroke injection attack platform released in 2010. Once connected to a host computer, the Rubber Ducky poses as a keyboard and injects a preloaded keystroke sequence.
2)
PHUKD/URFUKED attack platforms - similar to Rubber Ducky, but allows an attacker to select the time when it injects the malicious keystrokes.
..
..
...
...