Everybody is talking about BadUSB attacks:
“If you put anything into your USB [slot], it extends a lot of trust,” Karsten Nohl, chief scientist at Security Research Labs in Berlin
“The BadUSB attack is quickly gaining global attention, and rightfully so.” Ken Jones, VP engineering and product management, IronKey Secure USB Devices
“Until strategies and plans to implement protection against firmware manipulation come into play, we can only urge you to be cautious.” Niall Mackey
And there are real and serious reasons:
There is no full proof protections to this new kind of attack.
You don’t need to be a scripting Guru in order to configure some scripts.
Anyone can get this device for as low as 1$ on eBay-
Want to know more ? Enrol today and find out a detailed explanation and exclusive scripts to perform your own assessments with this new kind of approach.
Learn how to:
•Set a virtual machine to perform security assessments
•Learn how to setup and use Arduino UI
•Code a security analysis script payload
•Code a reverse shell script payload
•Code a WiFi password grabber payload
•Learn how to avoid this type of attacks
•Security services and mechanisms to improve IT security
This course is constantly reviewed and updated with new lessons.
All your questions and suggestions will always have feedback, sign up today and start learning now.