I've Got a Pocket Bone to Pick with You
Offered By: YouTube
Course Description
Overview
Explore the intricacies of USB gadget manipulation and exploitation in this 46-minute conference talk from GrrCON 2017. Delve into USB gadget basics, focusing on BeagleBoard implementation and USB mass storage device exportation. Learn techniques for making exported drives writable and impersonating USB mass storage devices. Examine HID report descriptor details and discover how to create and utilize new HID devices. Follow along with Python preliminaries and the UdeckHid class implementation. Witness practical demonstrations of simple Linux attacks and Windows exploitations using these techniques. Gain valuable insights into USB security vulnerabilities and potential attack vectors in this comprehensive presentation.
Syllabus
Intro
I have a Pocket Bone to Pick with You
What is this talk about?
Why should you care?
Roadmap
Disclaimers
DECK LINUX
USB Gadget Basics
USB Gadget on Beagle
Exporting USB Mass Storage Device
Exporting USB MS (continued)
Making the exported drive writable
USB Mass Storage Impersonation
Setup
Unmount Drive
Export Drive
Configfs
Create Device
Add a Config
Finalize
HID Report Descriptor Detail
Using the new HID
Python Prelims
Python: UdeckHid Class
Simple Linux Attack
Let's Attack Windows
Questions?
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube