Keynterceptor - Press Any Key to Continue
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore a groundbreaking presentation on USB security vulnerabilities and a novel attack tool called Keynterceptor. Delve into the history of USB attack vectors, including hardware key-logging, driver fuzzing, power surge injection, and network traffic re-routing. Learn about existing defensive measures and their limitations in fully mitigating USB-related risks. Discover how Keynterceptor, a proof-of-concept keyboard implant, bypasses current security mechanisms, including USB hardware firewalls, by capturing and injecting keystrokes while communicating over the air via a back-channel. Understand the potential threat posed by this affordable, off-the-shelf device and witness its effectiveness in a real-world endpoint compromise scenario. Gain insights from Niels van Dijkhuizen, a lead analyst at a large organization's CSIRT, as he demonstrates the Keynterceptor and discusses its implications for USB security.
Syllabus
#HITB2018AMS CommSec D1 - Keynterceptor: Press Any Key to Continue - Niels van Dijkhuizen
Taught by
Hack In The Box Security Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network