Run specific files located on the USB drive<\/li>\n<\/ul>\n <\/p>\n
Of course it is not a \u201clost\u201d drive.\u00a0 It was placed there.\u00a0 Students in my classes are given a USB drive and are challenged to think of ways to have their drive phone home to signal success.\u00a0 Here are some of the factors that lead to success:<\/p>\n
<\/p>\n
Put a paper or other label on it, indicating something that would make a stranger curious.\u00a0 Salaries, DEA Report or \u201cConfidential\u201d have worked well in the past.\u00a0 \u201cWife\u2019s Bikini Pictures\u201d and the like don\u2019t work. My guess is that it is viewed as unseemly and therefore potentially dangerous.<\/p>\n
<\/p>\n
The USB drive does not collect any sensitive information.\u00a0 The HTML file and scripts only log the date\/time when a hit is received and the text label applied to the files.\u00a0 The text label simply allow us to identify the originator (student) for the USB. The launch line in the HTML file is:<\/p>\n
<\/p>\n
securitytutoring.com\/usbhit.php?country=CountryCode&ID=YOUR_NAME&city=YOUR_CITY&location=Placement_Site&media=USB<\/pre>\n <\/p>\n
Once at this site, the browser is immediately referred to cnn.com.<\/p>\n
<\/p>\n
The output looks like this:<\/p>\n
<\/p>\n
Hit on Portable Media 2014-08-11 22:50:19 US Eastern time. Country=US, City=LOS ALAMOS, Location:\u00a0Hot Rocks Cafe,\u00a0USB Drive\u00a0media, Identifier: HATIM<\/h4>\n
<\/p>\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
USB\u00a0Project Have you ever found a USB drive and plugged it in to see what is on it? It could contain malware or other destructive executables.\u00a0 SecurityTutoring.com tests human nature with its USB Project.\u00a0 USB drives are placed all over in places where they may be found by everyday people.\u00a0 When the devices are plugged […]<\/p>\n","protected":false},"author":64,"featured_media":859,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"hide_page_title":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/www.securitytutoring.com\/wp-json\/wp\/v2\/pages\/856"}],"collection":[{"href":"https:\/\/www.securitytutoring.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.securitytutoring.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.securitytutoring.com\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securitytutoring.com\/wp-json\/wp\/v2\/comments?post=856"}],"version-history":[{"count":0,"href":"https:\/\/www.securitytutoring.com\/wp-json\/wp\/v2\/pages\/856\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securitytutoring.com\/wp-json\/wp\/v2\/media\/859"}],"wp:attachment":[{"href":"https:\/\/www.securitytutoring.com\/wp-json\/wp\/v2\/media?parent=856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}