Completed
Attack challenges
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Achieving Linux Kernel Code Execution Through a Malicious USB Device
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Why USB based attacks?
- 3 CVE-2016-2384: what is it about?
- 4 USB probing process
- 5 CVE-2016-2384: what happens with the heap?
- 6 The midi object
- 7 Exploitation primitive
- 8 USB HID Probing
- 9 Development environment: QEMU
- 10 Payload delivery method
- 11 Where to hijack the code?
- 12 Payload design
- 13 Exploit payload
- 14 Run shell commands
- 15 Attack challenges
- 16 Exploit mitigations
- 17 Applicability
- 18 Exploitation Requirements
- 19 Takeaways