Building Trojan Hardware at Home
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the world of hardware hacking and Trojan devices in this Black Hat conference talk. Learn about modifying hardware, using the Glitch Platform, and creating various Trojan devices such as mice, keyboards, and card loggers. Discover techniques for embedding hardware, modifying firmware, and jailbreaking devices. Gain insights into countermeasures and resources for further exploration in the field of hardware security. Delve into the potential risks and implications of Trojan hardware in everyday devices, from routers to LCD TVs and Blu-Ray players.
Syllabus
Building Trojan Hardware at Home
This Guy
What is Hardware?
Modify Hardware
The Glitch Platform
Glitch Platform made Easy
Keystroke Injection • Emulating computer keyboard
HIDIScript Example
Trojan Mouse
Payload
Trojan Keyboard
Trojan Card Logger
Trojan Desktop/Pos • Plug into motherboard USB pins inside case
How can we make this stealthier?
Trojan Network Connection • Hardware Trojan Router Network
Trojan LCD TV & Blu-Ray Player
Trojan On-The-Spot
Embed Hardware
Modify Firmware
Flash Firmware
Programmers
Jail Break
Linux YAY!!!
Trojan Devices
Countermeasures
Resources
Questions?
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube