Converting a threat into a solution
As you have seen throughout this book, there are a lot of hacking tools that an attacker can use against your infrastructure. However, as a master in defensive security, you need to leverage those threats and use them for your own benefit – use your opponent's weapon against them.
Let's look at an example. Remember the USB HID vulnerabilities that we reviewed in Chapter 2, Managing Threats, Vulnerabilities, and Risks? Well, let me show you how those vulnerabilities were leveraged to create a solution that solves another cybersecurity issue: passwords!
To start, let's begin by looking at the well-known problem of passwords.
The problem
Currently, you can use password managers to inject your passwords into applications inside your operating system, but you cannot use it to inject passwords to log into a computer. So, to log into the operating system, you will have to open the password manager application, read the...