Главная
Study mode:
on
1
Intro
2
I have a Pocket Bone to Pick with You
3
What is this talk about?
4
Why should you care?
5
Roadmap
6
Disclaimers
7
DECK LINUX
8
USB Gadget Basics
9
USB Gadget on Beagle
10
Exporting USB Mass Storage Device
11
Exporting USB MS (continued)
12
Making the exported drive writable
13
USB Mass Storage Impersonation
14
Setup
15
Unmount Drive
16
Export Drive
17
Configfs
18
Create Device
19
Add a Config
20
Finalize
21
HID Report Descriptor Detail
22
Using the new HID
23
Python Prelims
24
Python: UdeckHid Class
25
Simple Linux Attack
26
Let's Attack Windows
27
Questions?
Description:
Explore the intricacies of USB gadget manipulation and exploitation in this 46-minute conference talk from GrrCON 2017. Delve into USB gadget basics, focusing on BeagleBoard implementation and USB mass storage device exportation. Learn techniques for making exported drives writable and impersonating USB mass storage devices. Examine HID report descriptor details and discover how to create and utilize new HID devices. Follow along with Python preliminaries and the UdeckHid class implementation. Witness practical demonstrations of simple Linux attacks and Windows exploitations using these techniques. Gain valuable insights into USB security vulnerabilities and potential attack vectors in this comprehensive presentation.

I've Got a Pocket Bone to Pick with You

Add to list