Comment Re:That's what you get (Score 1) 252
Ehhhh, what? Plug in the the pretend-to-be keyboard and then? Bruteforce the root password? You do realize unix is a multiuser system right? Well, of course you don't.
I absolutely realize that unix is multiuser. I also know that on multiuser systems the physical console of the machine typically has special access. As mentioned above, one could send a keyboard sequence that reboots the machine -- say maybe Magic SysRq or maybe even a simple CTL-ALT-DEL. Sure, the configuration may have disabled these things, but probably not. When the system reboots, keystrokes can be sent to the BIOS directing it to boot off of your USB device (before the OS reloads.) Since presumably the attackers have intimate knowledge of the hardware (they know where to find the USB port), they could likely figure out the timing involved in driving the system through a reboot and alternate startup.