An attacker exploits weaknesses in the physical hardware of a machine in order to gain unauthorized access to the device or system. Hacking hardware devices falls into several broad categories depending upon the relative sophistication of the attacker and the type of systems that are targeted. Attacks against hardware devices differ from software attacks in that hardware-based attacks target the chips, circuit boards, device ports, or other components that comprise a computer system or embedded system. The most common hardware devices which are attacked are computer systems such as laptops, desktops and server platforms. Simple attacks may range from inserting an unauthorized USB drive into a system or using a Boot disk or CD to gain access to an unprotected system. Other more sophisticated attacks may involve adding or removing jumpers to an exposed system, or applying sensors to portions of the motherboard to read dataas it traverses the system bus.