YoVDO

I've Got a Pocket Bone to Pick with You

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses USB Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of USB gadget manipulation and exploitation in this 46-minute conference talk from GrrCON 2017. Delve into USB gadget basics, focusing on BeagleBoard implementation and USB mass storage device exportation. Learn techniques for making exported drives writable and impersonating USB mass storage devices. Examine HID report descriptor details and discover how to create and utilize new HID devices. Follow along with Python preliminaries and the UdeckHid class implementation. Witness practical demonstrations of simple Linux attacks and Windows exploitations using these techniques. Gain valuable insights into USB security vulnerabilities and potential attack vectors in this comprehensive presentation.

Syllabus

Intro
I have a Pocket Bone to Pick with You
What is this talk about?
Why should you care?
Roadmap
Disclaimers
DECK LINUX
USB Gadget Basics
USB Gadget on Beagle
Exporting USB Mass Storage Device
Exporting USB MS (continued)
Making the exported drive writable
USB Mass Storage Impersonation
Setup
Unmount Drive
Export Drive
Configfs
Create Device
Add a Config
Finalize
HID Report Descriptor Detail
Using the new HID
Python Prelims
Python: UdeckHid Class
Simple Linux Attack
Let's Attack Windows
Questions?


Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX