Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of hardware hacking with JP Dunning's Derbycon 2012 conference talk on The Glitch platform. Dive into the intricacies of this versatile hacking tool, covering its components, modules, and developers. Learn about keystroke injection payloads, target operating systems, and HIDIScript examples. Discover how to create a selection keylogger and utilize Bluetooth capabilities. Watch live demonstrations of embedding The Glitch in various hardware devices, including computer mice, keyboards, external DVD drives, and portable hard drive cases. Gain practical knowledge on modifying USB adapters, soldering techniques, and creative ways to conceal The Glitch within everyday peripherals. This 40-minute presentation provides a comprehensive overview of The Glitch's potential for both offensive and defensive security applications.
Syllabus
Intro
The Glitch Platform
Developers
Modules
Components
Keystroke Injection Payloads Target Operating System
HIDIScript Example
Selection
Keylogger
Bluetooth
DEMO
Embedding in Hardware
Computer Mouse
Open Mouse
Look For Space
USB Adapter
Add Adapter to USB Hub
Pull Out USB Cable
Solder to USB Hub
"Upgrade" Mouse
Keyboard
External DVD Drive
Portable Hard Drive Case
Make The Glitch!