Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking presentation on USB security vulnerabilities and a novel attack tool called Keynterceptor. Delve into the history of USB attack vectors, including hardware key-logging, driver fuzzing, power surge injection, and network traffic re-routing. Learn about existing defensive measures and their limitations in fully mitigating USB-related risks. Discover how Keynterceptor, a proof-of-concept keyboard implant, bypasses current security mechanisms, including USB hardware firewalls, by capturing and injecting keystrokes while communicating over the air via a back-channel. Understand the potential threat posed by this affordable, off-the-shelf device and witness its effectiveness in a real-world endpoint compromise scenario. Gain insights from Niels van Dijkhuizen, a lead analyst at a large organization's CSIRT, as he demonstrates the Keynterceptor and discusses its implications for USB security.