YoVDO

Universal Serial aBUSe - Remote Physical Access Attacks

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses

Course Description

Overview

Explore novel USB-level attacks providing remote command and control of air-gapped machines with minimal forensic footprint in this 40-minute conference talk from the 44CON Information Security Conference. Delve into the creation of malicious USB devices using low-cost hardware, focusing on stealthy bi-directional communication channels between host and device. Learn about remote connectivity via 3G/Wi-Fi/Bluetooth, offloading complexity to hardware, and leaving only a small stub on the host. Discover improvements over existing work, including bypassing network controls and minimizing forensic trails. Gain insights into demonstrating physical bypass risks of software security without an extensive budget, and understand the importance of building defenses in this area.

Syllabus

Intro
Quick Intro
Why did you pursue this attack
Cottonmouth Devices
Apex Predator
Physical Inspection
Remote Trigger
Avoid obvious vectors
Automated
User Interaction
Previous Work
Cactus Micro Revision 2
Building our own board
Finished Hardware
Attack Scenario
ESPLink
LEAP Stack
Injection
VNC
USB Drivers
Back Channel
Scripted VNC
Debugging
Pogo Pins
Vanilla Shell
Using existing attack frameworks
USB Security


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube