Explore the intricacies of USB gadget manipulation and exploitation in this 46-minute conference talk from GrrCON 2017. Delve into USB gadget basics, focusing on BeagleBoard implementation and USB mass storage device exportation. Learn techniques for making exported drives writable and impersonating USB mass storage devices. Examine HID report descriptor details and discover how to create and utilize new HID devices. Follow along with Python preliminaries and the UdeckHid class implementation. Witness practical demonstrations of simple Linux attacks and Windows exploitations using these techniques. Gain valuable insights into USB security vulnerabilities and potential attack vectors in this comprehensive presentation.