Overview
Explore the intricacies of USB gadget manipulation and exploitation in this 46-minute conference talk from GrrCON 2017. Delve into USB gadget basics, focusing on BeagleBoard implementation and USB mass storage device exportation. Learn techniques for making exported drives writable and impersonating USB mass storage devices. Examine HID report descriptor details and discover how to create and utilize new HID devices. Follow along with Python preliminaries and the UdeckHid class implementation. Witness practical demonstrations of simple Linux attacks and Windows exploitations using these techniques. Gain valuable insights into USB security vulnerabilities and potential attack vectors in this comprehensive presentation.
Syllabus
Intro
I have a Pocket Bone to Pick with You
What is this talk about?
Why should you care?
Roadmap
Disclaimers
DECK LINUX
USB Gadget Basics
USB Gadget on Beagle
Exporting USB Mass Storage Device
Exporting USB MS (continued)
Making the exported drive writable
USB Mass Storage Impersonation
Setup
Unmount Drive
Export Drive
Configfs
Create Device
Add a Config
Finalize
HID Report Descriptor Detail
Using the new HID
Python Prelims
Python: UdeckHid Class
Simple Linux Attack
Let's Attack Windows
Questions?