A Historical Look at Hardware Token Compromises
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the history of hardware token compromises in this Black Hat USA 2004 conference talk presented by Joe Grand. Delve into the vulnerabilities of various hardware token technologies, including USB and iButton devices. Examine the mechanical and electrical aspects of USB tokens, with a focus on the Aladdin eToken 3.3.3.x and Rainbow iKey 1000. Learn about communication channels, software vulnerabilities, and electrical recommendations for USB tokens. Discover new token technologies and gain insights into the security challenges of iButton devices, particularly the DS1991 Multikey. This comprehensive presentation provides a valuable historical perspective on hardware token security, offering lessons that remain relevant in today's cybersecurity landscape.
Syllabus
Intro
Hardware Tokens: USB
USB: Mechanical
Aladdin e Token 3.3.3.x
USB: Electrical Rainbow iKey 1000
USB: Electrical Recommendations
USB: Software
Communication Channels
USB: New Token Technologies 2
Hardware Tokens: iButton 2
iButton: DS1991 Multikey
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network