I mean, I'm a tech guy here in my region (not a hacker...). When I sit in the front of another person's PC, I notice a little fear about what I can do in the system.
It's obvious that I will not compromise/steal/etc the system... One of my jobs is fix systems and I'm a "ethic guy" in that matter.
But I don't know the character, the ethics, of another tech guys that fix another PCs. Actually, a great parcel of my income is from customers that have problems on PC, send to another techies; that guys "fix" the PC, and some time after the customer is knocking my door, begging for help because the another guy "destroyed" the system.
But now, I'm curious. What a (previously prepared) hacker can do when get physical access to a system? I can think about 3 different "levels" of resources that an hacker can use in that situations, that will change what he will do:
- He can possess a USB Drive with programs to compromise the system;
- He has broadband internet access in the target system, and he can do a quick download of a program;
- He has neither USB drives or internet access, so he will try compromise the system using some built-in operational system program or resource;
I know that the scope can be huge, so let's consider that the hacker will try ease the access from internet, so he will remote access the victm PC when he's in his home PC.
What he can do in that points? How do I to inspect the system about that kind of attack?