document updated 12 years ago, on Jan 22, 2013
The basic idea here is to make a computer appear as a USB peripheral. Once you have keyboard that you control, or a NIC, or a CDROM drive, you can do more evil things than you could with a vanilla keyboard/NIC/CD-drive.
The USB Rubber Ducky is a basic example of what can be done, though more sophisticated attacks are possible.