Just a usb and about 60 seconds. Logs would still show up though so they would need to have some persistent way to log in remotely and delete logs.
Discussion
What would you have on the ISB, and how would you root it to get remote access later?
Not sure its still a valid project one called poisontap comes to mind. You would plug it in and it would Exfiltrate cookies, poison your DNS cache, and then installed persistent backdoor for logging in later. As far as I know it worked on all OS's
This was the project im refering to.
does not work with https and some new caching and isolation countermeasures added by browsers