• azron
    link
    fedilink
    English
    1
    edit-2
    4 months ago

    No one pays attention to the prompts. If you’ve ever watched a standard computer user they click away a prompt as fast as it appears without even reading it.

    • @heavy
      link
      English
      14 months ago

      So I understand better, could you explain the scenario where you would use this and what it would get you as the attacker?

      Is it like: “Hey bud, please plug my phone into your computer.” Then, they click through everything, you get privileged execution, and you choose to modify the hosts file?

      You believe that would have a high chance of success? What do you get afterwards?