YoVDO

Infectious Media - Bypassing AutoRun Once and for All

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to bypass AutoRun security measures using Human Interface Device (HID) attack vectors in this 44-minute conference talk. Explore the Teensy DIY HID device, various attack methods, and USB filtering vulnerabilities. Dive into executable basics, payload creation, and techniques for handling large files. Discover how to convert EXE to HEX code and address issues with SD cards. Gain insights into Teensy Serial Libraries and ongoing developments in this field. Presented by Josh Kelley (winfang98) from Infectious Media at DerbyCon, this talk provides valuable information for cybersecurity professionals and enthusiasts interested in understanding and mitigating HID-based attacks.

Syllabus

Intro
Who am I?
HID as an attack vector
The Teensy - the DIY HID Device
Different attack vectors
Other fun
Less common attack vector
USB Filtering, the joke
Executables - The basics
The key large files
What about an shell?
The Swiss Army knife of payloads
But there is a problem?
EXE to HEX code
Converting from HEX to Binary
What about LARGE files?
Issues with the SD card
Large files and SD
Teensy Serial Libraries
Work in progress
Questions?
Relik as the bride


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube