The Human Interface Device Attack Vector Research and Development
Offered By: YouTube
Course Description
Overview
Explore the world of Human Interface Device (HID) attack vectors in this 29-minute conference talk from Derbycon 2015. Delve into the research and development of Stable24, a programmable HID, as Alexander Livingston Sega guides you through various aspects of this cybersecurity topic. Learn about the binary to Teensy conversion, the advantages of using HIDs in attacks, and the psychological factors involved. Examine the technical details of driver frameworks, interrupts, device objects, and driver models. Gain insights from industry experts like Kevin Mitnick, Bruce Schneider, and Chris Nickerson. Understand the importance of driver signing and discover the potential implications of HID-based attacks in the realm of cybersecurity.
Syllabus
Intro
The Binary to Teensy
The Programmable Human Interface Device
Why Use a Human Interface Device
Chemical Facts
Too Much Truth
Maslows Hierarchy
Trust Your Instincts
Kevin Mitnick
Bruce Schneider
Chris Nickerson
Pure Software
Driver Framework
Interrupts
Device Object
Driver Model
Driver Signing
Conclusion
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX