YoVDO

Building Trojan Hardware at Home

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Embedded Systems Courses Linux Courses Hardware Security Courses

Course Description

Overview

Explore the world of hardware hacking and Trojan devices in this Black Hat conference talk. Learn about modifying hardware, using the Glitch Platform, and creating various Trojan devices such as mice, keyboards, and card loggers. Discover techniques for embedding hardware, modifying firmware, and jailbreaking devices. Gain insights into countermeasures and resources for further exploration in the field of hardware security. Delve into the potential risks and implications of Trojan hardware in everyday devices, from routers to LCD TVs and Blu-Ray players.

Syllabus

Building Trojan Hardware at Home
This Guy
What is Hardware?
Modify Hardware
The Glitch Platform
Glitch Platform made Easy
Keystroke Injection • Emulating computer keyboard
HIDIScript Example
Trojan Mouse
Payload
Trojan Keyboard
Trojan Card Logger
Trojan Desktop/Pos • Plug into motherboard USB pins inside case
How can we make this stealthier?
Trojan Network Connection • Hardware Trojan Router Network
Trojan LCD TV & Blu-Ray Player
Trojan On-The-Spot
Embed Hardware
Modify Firmware
Flash Firmware
Programmers
Jail Break
Linux YAY!!!
Trojan Devices
Countermeasures
Resources
Questions?


Taught by

Black Hat

Related Courses

Introduction to Linux
Linux Foundation via edX
操作系统原理(Operating Systems)
Peking University via Coursera
Internet of Things: Setting Up Your DragonBoard™ Development Platform
University of California, San Diego via Coursera
Information Security-3
Indian Institute of Technology Madras via Swayam
Introduction to Embedded Systems Software and Development Environments
University of Colorado Boulder via Coursera