Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Building Trojan Hardware at Home

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of hardware hacking and Trojan devices in this Black Hat conference talk. Learn about modifying hardware, using the Glitch Platform, and creating various Trojan devices such as mice, keyboards, and card loggers. Discover techniques for embedding hardware, modifying firmware, and jailbreaking devices. Gain insights into countermeasures and resources for further exploration in the field of hardware security. Delve into the potential risks and implications of Trojan hardware in everyday devices, from routers to LCD TVs and Blu-Ray players.

Syllabus

Building Trojan Hardware at Home
This Guy
What is Hardware?
Modify Hardware
The Glitch Platform
Glitch Platform made Easy
Keystroke Injection • Emulating computer keyboard
HIDIScript Example
Trojan Mouse
Payload
Trojan Keyboard
Trojan Card Logger
Trojan Desktop/Pos • Plug into motherboard USB pins inside case
How can we make this stealthier?
Trojan Network Connection • Hardware Trojan Router Network
Trojan LCD TV & Blu-Ray Player
Trojan On-The-Spot
Embed Hardware
Modify Firmware
Flash Firmware
Programmers
Jail Break
Linux YAY!!!
Trojan Devices
Countermeasures
Resources
Questions?

Taught by

Black Hat

Reviews

Start your review of Building Trojan Hardware at Home

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.