Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

BadUSB - On Accessories that Turn Evil

Black Hat via YouTube

Overview

Explore the hidden dangers of USB devices in this eye-opening Black Hat conference talk. Delve into a new form of malware that operates from controller chips inside USB devices, learning how seemingly innocuous accessories can be reprogrammed to spoof other device types, compromising computer security. Witness demonstrations of full system compromise and a self-replicating USB virus that evades current defenses. Examine the USB stack to understand potential anchors for protection against USB malware. Gain insights into various attack vectors, including device identification spoofing, password exploitation, and boot sector viruses. Discover the implications for USB3 controllers, cloud environments, and GSM rainbow tables. Leave with a deeper understanding of USB security vulnerabilities and potential defense strategies.

Syllabus

Intro
Demo
USB Basics
Device Identification
Device Registration
Update Process
New USB Stick
Linux Notebook
Linux USB Stick
Password Exploit
Other USB Devices
USB3 Controller
Second Idea
USB Trust
Cloud Environment
Boot Sector Virus
USB Controller Virus
Defenses
GSM Rainbow Tables
Questions

Taught by

Black Hat

Reviews

Start your review of BadUSB - On Accessories that Turn Evil

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.