Disclosure: when you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking – USB injection with DigiSpark (2022)

Automate your processes or perform a stealth pen-test assessment with this new kind of technical approach.
4.0
4.0/5
(14 reviews)
1,686 students
Created by

7.3

CourseMarks Score®

5.6

Freshness

7.0

Feedback

8.7

Content

Platform: Udemy
Video: 58m
Language: English
Next start: On Demand

Table of contents

Description

Everybody is talking about BadUSB attacks:
“If you put anything into your USB [slot], it extends a lot of trust,” Karsten Nohl, chief scientist at Security Research Labs in Berlin
“The BadUSB attack is quickly gaining global attention, and rightfully so.” Ken Jones, VP engineering and product management, IronKey Secure USB Devices
“Until strategies and plans to implement protection against firmware manipulation come into play, we can only urge you to be cautious.” Niall Mackey 

And there are real and serious reasons: 
There is no full proof protections to this new kind of attack.
You don’t need to be a scripting Guru in order to configure some scripts.  
Anyone can get this device for as low as 1$ on eBay-

Want to know more ? Enrol today and find out a detailed explanation and exclusive scripts to perform your own assessments with this new kind of approach. 
Learn how to:
•Set a virtual machine to perform security assessments
•Learn how to setup and use Arduino UI
•Code a security analysis script payload
•Code a reverse shell script payload
•Code a WiFi password grabber payload
•Learn how to avoid this type of attacks
•Security services and mechanisms to improve IT security 
This course is constantly reviewed and updated with new lessons.
All your questions and suggestions will always have feedback, sign up today and start learning now.

You will learn

✓ Install and configure Arduino UI and Digispark
✓ Code security assessment payloads
✓ Code exploitation payloads to retrieve sensitive information
✓ Learn the basics to write your own code

Requirements

• Students must be intermediate computer users

This course is for

• People focused in new IT security methodologies
Learn, explore and share.
Courses range from WordPress, virtual reality, apps coding and other information technologies domains.
I have been teaching IT since 2007 and besides having a master degree in multimedia I like to share my knowledge and learn from my students to improve with each new course 
Sharing my IT passion with you is the main goal, check out the positive feedbacks and I hope to have one from you in the future.
Start learning now, sign up today.
Browse all courses by on Coursemarks.
Platform: Udemy
Video: 58m
Language: English
Next start: On Demand

Students are also interested in