YoVDO

Building Trojan Hardware at Home

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Embedded Systems Courses Linux Courses Hardware Security Courses

Course Description

Overview

Explore the world of hardware hacking and Trojan devices in this Black Hat conference talk. Learn about modifying hardware, using the Glitch Platform, and creating various Trojan devices such as mice, keyboards, and card loggers. Discover techniques for embedding hardware, modifying firmware, and jailbreaking devices. Gain insights into countermeasures and resources for further exploration in the field of hardware security. Delve into the potential risks and implications of Trojan hardware in everyday devices, from routers to LCD TVs and Blu-Ray players.

Syllabus

Building Trojan Hardware at Home
This Guy
What is Hardware?
Modify Hardware
The Glitch Platform
Glitch Platform made Easy
Keystroke Injection • Emulating computer keyboard
HIDIScript Example
Trojan Mouse
Payload
Trojan Keyboard
Trojan Card Logger
Trojan Desktop/Pos • Plug into motherboard USB pins inside case
How can we make this stealthier?
Trojan Network Connection • Hardware Trojan Router Network
Trojan LCD TV & Blu-Ray Player
Trojan On-The-Spot
Embed Hardware
Modify Firmware
Flash Firmware
Programmers
Jail Break
Linux YAY!!!
Trojan Devices
Countermeasures
Resources
Questions?


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube