Learn how to intercept USB traffic for both offensive and defensive purposes in this 23-minute conference talk from Derbycon 2015. Explore the concept of Bad USB, understand various USB interfaces, and discover defensive strategies against USB-based attacks. Gain insights into endpoints, mass storage interfaces, and host OS commands. Watch practical demonstrations and learn about tools like Vicar for USB traffic analysis. Enhance your cybersecurity skills by understanding the intricacies of USB communication and potential vulnerabilities.
Overview
Syllabus
Intro
Endpoints
How it Works
The Bad USB Thing
The Bad USB Thing 2
What are our defenses
Vicar
Flash
Interfaces
First Demo
Mass Storage Interface
Mass Storage Response
Right Sector Command
Host OS Command
Wrapping Up