Главная
Study mode:
on
1
Introduction
2
Eddie Burstein
3
Mr Abou
4
The Question
5
Types of Attacks
6
Social Engineering Attack
7
HID
8
Pros and Cons
9
How Effective
10
Getting Approval
11
The Framework
12
The Mindset
13
The Label
14
Parking Lot
15
Inside Building
16
Parking Lot Drop
17
What Happened
18
Did It Work
19
Study Results
20
Speed of Opening
21
Key Appearance
22
Drop Location
23
Why People Open The Keys
24
The Most Open Keys
25
Dropping Keys
26
Dropping Keys Demo
27
Metasploit Demo
28
Human Interface Devices
29
Challenges
30
How do you craft the payload
31
Gotchas
32
Code
33
USB Fingerprinting
34
River Shell
35
Notes
36
Macro
37
Windows
38
GitHub
39
Soldering
40
Silicone Key
41
Casting
42
Excess resin
43
First attempt
44
Lubricant
45
Results
46
Cost
47
Lazy approach
48
How to defend
49
Do you want one
50
Advanced HID keys
51
Outro
Description:
Explore the effectiveness and implications of the infamous "USB drop" hacking technique in this Black Hat conference talk. Delve into a rigorous study conducted at the University of Illinois Urbana-Champaign campus, where nearly 300 USB drives were strategically dropped to measure user interaction. Discover shocking results, with 98% of drives picked up and 48% of users not only plugging them in but also accessing files. Gain insights into factors influencing drive retrieval, user motivations, and the psychology behind this social engineering tactic. Learn about various USB-based attack methods, including Human Interface Device (HID) exploits, and explore their pros and cons. Understand the ethical considerations and approval process for conducting such research. Examine the study's framework, mindset, and methodology, including labeling strategies and drop locations. Analyze the speed of drive access, key appearance impact, and most effective drop sites. Witness demonstrations of dropping keys and Metasploit payloads. Dive into the technical challenges of crafting payloads, USB fingerprinting, and creating custom USB devices. Explore defensive strategies against these attacks and consider the broader implications for physical and cybersecurity. Read more

Does Dropping USB Drives in Parking Lots and Other Places Really Work?

Black Hat
Add to list