Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{200186,
author = {Gunav S and N VISHNU VENKATESH and Suvetha O and Rolfin Liston Pais and Manoj R and Palli Nithin},
title = {Technical Analysis and Defensive Strategies: Design and Implementation of the Covert HID Injection OMG Cable},
journal = {International Journal of Innovative Research in Technology},
year = {2026},
volume = {12},
number = {12},
pages = {447-451},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=200186},
abstract = {This research details the design, functionality, and mitigation strategies for a novel hardware attack platform: the Covert OMG Cable. This device disguises a potent Human Interface Device (HID) attack vector, an ESP32 microcontroller, and local storage (SD Card) inside a standard-appearing USB cable. This prototype enables reliable, remote, and contactless payload injection against target workstations, exploiting implicit operating system trust in peripheral devices. This paper analyzes the architectural design of the covert hardware, presents methodologies for remote command-and-control (C2), conducts a vulnerability and security impact assessment through controlled penetration testing, and proposes a robust framework for defensive measures, detection strategies, and educational resources essential for mitigating this class of physical-access threat.},
keywords = {},
month = {May},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry