Plug And Root, The Usb Key To The Kingdom presented at Blackhat USA 2005

by David Dewey,

Tags: Security Exploitation

Summary : USB peripheral devices are made by
reputable manufacturers and will not misbehave by attacking the host
system's operating system. This device is not one of those. This
discussion will cover the creation of a USB meta-device, the discovery
and exploitation of flaws in operating system device drivers. In a
nutshell, plug this device into an otherwise locked system and it will
automatically take control of the system.