This is sort of like working in a lab with toxic chemicals. There is a way to work and wear certain special clothes so you don't get contaminated. Likewise, I wonder if when dealing with malware you can still use the source/infected machines for their functionality, even though they are infected, and still not get infected on the target device when connecting via USB.
I'm wondering because I don't yet know how to think about the directional flow of code in terms of what device can install something on what other devices it can connect to. I'm not sure what pieces there are to take into account. So it seems that if you knew that A would infect anything it's plugged into, but that B wouldn't let any traffic out except a specific acceptable kind, then you could plug A into B, B would get infected but still allow connection to C without C getting infected. That sort of thing.
https://www.theregister.co.uk/2017/11/07/linux_usb_security_bugs/
– Emily G Jan 03 '19 at 02:33TBH it sounds more like the OP just needs to learn how to sandbox properly and set up VMs. Set this up and use it correctly, and USB malware isn't any more likely to escape than any other malware.
I'm still sticking with my original statement though - USB is inherently insecure: https://kumarde.com/papers/plug_and_pray.pdf
– Emily G Jan 03 '19 at 03:22USB's with that specific chip are nearly impossible to find now aside from buying one through here: https://shop.hak5.org/products/usb-rubber-ducky-deluxe
– they Jan 03 '19 at 13:51