Overview
Syllabus
Introduction
Eddie Burstein
Mr Abou
The Question
Types of Attacks
Social Engineering Attack
HID
Pros and Cons
How Effective
Getting Approval
The Framework
The Mindset
The Label
Parking Lot
Inside Building
Parking Lot Drop
What Happened
Did It Work
Study Results
Speed of Opening
Key Appearance
Drop Location
Why People Open The Keys
The Most Open Keys
Dropping Keys
Dropping Keys Demo
Metasploit Demo
Human Interface Devices
Challenges
How do you craft the payload
Gotchas
Code
USB Fingerprinting
River Shell
Notes
Macro
Windows
GitHub
Soldering
Silicone Key
Casting
Excess resin
First attempt
Lubricant
Results
Cost
Lazy approach
How to defend
Do you want one
Advanced HID keys
Outro
Taught by
Black Hat