Infectious Media - Bypassing AutoRun Once and for All
Offered By: YouTube
Course Description
Overview
Learn how to bypass AutoRun security measures using Human Interface Device (HID) attack vectors in this 44-minute conference talk. Explore the Teensy DIY HID device, various attack methods, and USB filtering vulnerabilities. Dive into executable basics, payload creation, and techniques for handling large files. Discover how to convert EXE to HEX code and address issues with SD cards. Gain insights into Teensy Serial Libraries and ongoing developments in this field. Presented by Josh Kelley (winfang98) from Infectious Media at DerbyCon, this talk provides valuable information for cybersecurity professionals and enthusiasts interested in understanding and mitigating HID-based attacks.
Syllabus
Intro
Who am I?
HID as an attack vector
The Teensy - the DIY HID Device
Different attack vectors
Other fun
Less common attack vector
USB Filtering, the joke
Executables - The basics
The key large files
What about an shell?
The Swiss Army knife of payloads
But there is a problem?
EXE to HEX code
Converting from HEX to Binary
What about LARGE files?
Issues with the SD card
Large files and SD
Teensy Serial Libraries
Work in progress
Questions?
Relik as the bride
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube