Which of the following can be used in a USB attack to bypass authentication by hijacking the password libraries on a Windows system?
Which of the following can be used in a USB attack to bypass authentication by hijacking the password libraries on a Windows system?
Kon-boot is a well-known software tool that is specifically designed to bypass authentication systems, including hijacking password libraries on Windows systems. This makes it the correct answer for a USB attack intended to bypass authentication. Other tools like Rubber Ducky, Lan Turtle, and Inception have different primary functions related to security testing and penetration but do not specifically target the authentication bypass by hijacking password libraries.
D is correct