USB HID Attacks: Architecture and Educational Lab Study
Introduction USB Human Interface Devices (HID), such as keyboards and mice, are implicitly trusted by modern operating systems. This trust model enables seamless user interaction but also introduces a critical attack surface when abused. This post documents an educational laboratory project based on a Raspberry Pi Pico, designed to study USB HID-based attack techniques in a controlled, ethical environment. Rather than focusing on real-world exploitation, the goal is to understand the underlying mechanics, trust assumptions, and architectural decisions that make this attack vector possible. ...