Basically it would be a USB device that tells the Windows system it’s a generic keyboard+mouse. Then it would simulate the entry of input something like: 1) WinKey + R 2) cmd.exe [enter] 3) [enters or pasted a malicious script] 4) await UAC prompt. Click pre-calculated dimensions for the button based on screen size/dpi ratio..
Now the entire system is rooted in under 2 seconds.
Can someone explain what mitigations if any Microsoft has put in place (prior to the recent ASR which is new and probably also vulnerable?) to disable this [fake mouse and keyboard attack] ?
If they are an admin, they could just do this manually.
Either way, no privilege escalation, which "rooting" typically implies.
Sure, you could make a USB stick that automates any user input, but you could just make the same inputs yourself with the keyboard and mouse already at the machine. What kind of situation does this actually benefit you in?
The reason you can't is because many newer wireless devices have encryption, but how many people know or care when they buy one?
I spent a not insignificant amount of time looking into this, but for the purpose of making a game AI, not for hacking other people's computers.