USB Reverse shell program

During my school internship, I was assigned the task of creating a USB Drop attack. Since I had to come up with the specific way the attack would work, I decided to design it so that when the victim connects my USB to a Windows computer, a folder named ‘secrets 2024’ would appear, which might pique the victim’s interest to open it. However, upon opening it, from the victim’s point of view, it might seem like nothing happened, although in reality, my reverse shell would be launched, which would be executed every time the device is turned on, giving me absolute access to the victim’s device. Next, I will explain step by step how the task was created.

Read more