During a penetration test, once you get a local access to a target, you should start a local assessment of the machine in order to plan a correct tactic for privileges escalation and lateral movement.
Category: Penetration Testing
In the beginning it was the wardialing: the scan a block of numbers (dialed with specific software and a modem) often related to a company, in order to find out a fax or a modem response.
An interesting article by Luca Bongiorni explains how to create a remote controlled HID injector cable using some simple hardware components easily purchased on online stores (with less then 10$)
After a post focused on Android, another list of tools useful for penetration testing and reverse engineering of iOS applications.Also all this tools are OSS and freely available.
And some suggestion to hardening your buckets!