Attacking another device by plugging directly into it has always been something I thought would be movie hacker cool.
The real idea is that: Someone leaves their phone at the table, locked, and only for a few minutes. You pull your phone out, plug them together, and hope to god that have USB debugging enabled (all custom ROMs do.) Slurp down their files, stick your own backdoors there, and you’re set to go!
Took me about 45 seconds to copy over 62MB of com.android.google.* databases and user_prefs files (from encrypted Galaxy Nexus to unencrypted Galaxy Nexus, but running AOKP Milestone 5).
Yes, because as devious as I might think I am (and I am), I’m certain others have more clever ideas than mine.
As this project develops, it will form more into a framework, providing tools necessary to quickly, and sanely, allow users (i.e. you) to create scripts as easily as possible.
Most of the scripts should be doable by both PC and an Android phone.
Note: This was designed for sh (not bash/dash/ksh/etc). I can’t guarentee functionality will work across the shells.
An install has/supports adb (I believe stock comes with adb, otherwise you could probably add it)
An install that supports USB host mode
A phone that supports USB host mode (hardware support)