YoVDO

The Human Interface Device Attack Vector Research and Development

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of Human Interface Device (HID) attack vectors in this 29-minute conference talk from Derbycon 2015. Delve into the research and development of Stable24, a programmable HID, as Alexander Livingston Sega guides you through various aspects of this cybersecurity topic. Learn about the binary to Teensy conversion, the advantages of using HIDs in attacks, and the psychological factors involved. Examine the technical details of driver frameworks, interrupts, device objects, and driver models. Gain insights from industry experts like Kevin Mitnick, Bruce Schneider, and Chris Nickerson. Understand the importance of driver signing and discover the potential implications of HID-based attacks in the realm of cybersecurity.

Syllabus

Intro
The Binary to Teensy
The Programmable Human Interface Device
Why Use a Human Interface Device
Chemical Facts
Too Much Truth
Maslows Hierarchy
Trust Your Instincts
Kevin Mitnick
Bruce Schneider
Chris Nickerson
Pure Software
Driver Framework
Interrupts
Device Object
Driver Model
Driver Signing
Conclusion


Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX