Exploiting USB-IP in Linux

Exploiting USB-IP in Linux

Black Hat via YouTube Direct link

Soundbites

20 of 20

20 of 20

Soundbites

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Exploiting USB-IP in Linux

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 About me
  3. 3 Agenda
  4. 4 Are you vulnerable
  5. 5 What is USBIP
  6. 6 Basic architecture
  7. 7 Linux components
  8. 8 Client side of operations
  9. 9 Source code
  10. 10 USBIP protocol
  11. 11 Receiving code
  12. 12 Buffer overflow
  13. 13 Prerequisites
  14. 14 Demo
  15. 15 Data Injection
  16. 16 Kernel Memory Allocator
  17. 17 Tips
  18. 18 Protect your traffic
  19. 19 Additional resources
  20. 20 Soundbites

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.