BadUSB - On Accessories that Turn Evil
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the hidden dangers of USB devices in this eye-opening Black Hat conference talk. Delve into a new form of malware that operates from controller chips inside USB devices, learning how seemingly innocuous accessories can be reprogrammed to spoof other device types, compromising computer security. Witness demonstrations of full system compromise and a self-replicating USB virus that evades current defenses. Examine the USB stack to understand potential anchors for protection against USB malware. Gain insights into various attack vectors, including device identification spoofing, password exploitation, and boot sector viruses. Discover the implications for USB3 controllers, cloud environments, and GSM rainbow tables. Leave with a deeper understanding of USB security vulnerabilities and potential defense strategies.
Syllabus
Intro
Demo
USB Basics
Device Identification
Device Registration
Update Process
New USB Stick
Linux Notebook
Linux USB Stick
Password Exploit
Other USB Devices
USB3 Controller
Second Idea
USB Trust
Cloud Environment
Boot Sector Virus
USB Controller Virus
Defenses
GSM Rainbow Tables
Questions
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network