Main Article Content
Every day, people all around the world make strides forward in the fields of electrical engineering and information technology. We have used several equipment in the past, including cameras, cellular phones, lighting, and wristwatches. However, at this time there is only one gadget that can accomplish everything, and that is the smartphone. Likewise, computer ports provide a similar function. Peripherals can be connected to a computer through its ports. In the past, when computers were still in their infancy, many ports had more than one purpose. In the end, USBs were developed to replace them. USB, or the Universal Serial Bus, allows a computer to talk to its peripherals such a mouse, keyboard, graphics card, camera, and scanner. Since the HID device class has been standardized, a standard USB driver may be used in place of the obsolete PS/2 connections. Numerous specialized tools may be used to launch attacks on HID. Sending a brief sequence of keystrokes using the on-board flash memory storage can completely corrupt the target system. BadUSB attacks are a type of USB attack that is similar to the more common USB drive attacks. This research systematically examines the available literature to uncover countermeasures to common forms of cybercrime. Perhaps over time, the quality of answers will improve. However, the purpose of this survey is to investigate BadUSB devices. We look into HID assaults, and we extend on the idea to allow scripts to be sent via the web.