Your HACKED "BadUSB" Exploit Makes Devices Turn "Evil" - 2014

Описание к видео Your HACKED "BadUSB" Exploit Makes Devices Turn "Evil" - 2014

BADUSB ? what heck is that?

IMPORTANT !

In the video I talk about Reverse hacking ..
What i meant is Reverse Engineering !

Easy..on me ..I don't know everything about it , but that Computer users are in Danger , is 100% Clear to me , and in this video I will try to explain what I know until now.

I,m thinking allot in the video to find the right words and to keep it understandable for all , so forgive me the eeeh and eeehms..

Ok so what is BAD USB?
Badusb is created by reverse engineering of the USB device
and by inserting malware into the firmware , so when you use a infected stick your messed. Your USB ports will be hacked and so will your keyboard and mouse.

Let's see what Pro's say about it..

When creators of the state-sponsored Stuxnet worm used a USB stick to infect air-gapped computers inside Iran's heavily fortified Natanz nuclear facility, trust in the ubiquitous storage medium suffered a devastating blow. Now, white-hat hackers have devised a feat even more seminal—an exploit that transforms keyboards, Web cams, and other types of USB-connected devices into highly programmable attack platforms that can't be detected by today's defenses.

Dubbed BadUSB, the hack reprograms embedded firmware to give USB devices new, covert capabilities. In a demonstration scheduled at next week's Black Hat security conference in Las Vegas, a USB drive, for instance, will take on the ability to act as a keyboard that surreptitiously types malicious commands into attached computers. A different drive will similarly be reprogrammed to act as a network card that causes connected computers to connect to malicious sites impersonating Google, Facebook or other trusted destinations. The presenters will demonstrate similar hacks that work against Android phones when attached to targeted computers. They say their technique will work on Web cams, keyboards, and most other types of USB-enabled devices.
"Please don't do anything evil"

By Steven J. Vaughan-Nichols for Between the Lines | July 31, 2014 -- 18:34 GMT (19:34 BST)

It's a common scene from TV: Our hero sneaks into the villain's office, plugs in a USB stick and — flash! — all the secret plans to conquer Chicago are sucked down into the thumb-drive. The only fiction is how fast it takes to download data. In the real world, office data thieves walk out with stolen data everyday on their flash drives.
Skull-Crossbones-USBUSB memory sticks may prove far more dangerous for your company than you'd ever imagined.

It could be worse. USB sticks can also carry malware. Or, as SRLabs security researchers Karsten Nohl and Jakob Lell propose to show at Black Hat, an ordinary USB pen drive can be turned into an automated hacking tool.

The base problem, according to the pair, is "USB has become so commonplace that we rarely worry about its security implications. USB sticks undergo the occasional virus scan, but we consider USB to be otherwise perfectly safe — until now."

Nohl and Lell continue:

USB devices are connected to – and in many cases even built into – virtually all computers. The interface standard conquered the world over the past two decades thanks to its versatility: Almost any computer peripheral, from storage and input gadgets to health-care devices, can connect over the ubiquitous technology. And many more device classes connect over USB to charge their batteries.

This versatility is also USB’s Achilles heel: Since different device classes can plug into the same connectors, one type of device can turn into a more capable or malicious type without the user noticing.


Turning USB peripherals into BadUSB

USB devices are connected to – and in many cases even built into – virtually all computers. The interface standard conquered the world over the past two decades thanks to its versatility: Almost any computer peripheral, from storage and input gadgets to healthcare devices, can connect over the ubiquitous technology. And many more device classes connect over USB to charge their batteries.

This versatility is also USB’s Achilles heel: Since different device classes can plug into the same connectors, one type of device can turn into a more capable or malicious type without the user noticing.

Reprogramming USB peripherals. To turn one device type into another, USB controller chips in peripherals need to be reprogrammed. Very widely spread USB controller chips, including those in thumb drives, have no protection from such reprogramming.

BadUSB – Turning devices evil. Once reprogrammed, benign devices can turn malicious in many ways, including:


(c) 2014

Комментарии

Информация по комментариям в разработке