Classic evil maid The attack begins when the victim leaves their device unattended. The attacker can then proceed to tamper with the system. If the victim's device does not have password protection or authentication, an intruder can turn on the computer and immediately access the victim's information. However, if the device is password protected, as with full disk
encryption, the firmware of the device needs to be compromised, usually done with an external drive. Another method of attack is through a
DMA attack in which an attacker accesses the victim's information through hardware devices that connect directly to the physical address space. The attacker simply needs to connect to the hardware device in order to access the information.
Network evil maid An evil maid attack can also be done by replacing the victim's device with an identical device. If the original device has a
bootloader password, then the attacker only needs to acquire a device with an identical bootloader password input screen. If the device has a
lock screen, however, the process becomes more difficult as the attacker must acquire the background picture to put on the lock screen of the mimicking device. In either case, when the victim inputs their password on the false device, the device sends the password to the attacker, who is in possession of the original device. The attacker can then access the victim's data. == Vulnerable interfaces ==