Physical attacks are the most effective and dangerous, of which Human Interface Device (HID) attacks are among my favorite. To compromise a client, you just need to insert a preprogrammed USB stick that is read as an HID, in this case a keyboard that will type and execute the payload.
Human Interface Device attacks
Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.