Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть #HITB2018AMS

  • Hack In The Box Security Conference
  • 2018-04-22
  • 154
#HITB2018AMS
hitbhitbsecconfhackintheboxkeynterceptorhitb2018amsNiels van Dijkhuizen
  • ok logo

Скачать #HITB2018AMS бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно #HITB2018AMS или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку #HITB2018AMS бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео #HITB2018AMS

The past decade has taught us that there are quite some attacks vectors on USB. These vary from hardware key-logging to driver fuzzing and from power surge injection to network traffic re-routing. In addition to addressing these issues, the security community has also tried to fix some of these. Several defensive hard- and software tools focus on a particular piece of the puzzle. However none, is able to completely mitigate the risks that involves the everyday use of USB in our lives.

Key stroke injectors like Rubber Ducky and MalDuino have a big disadvantage: they are not very stealthy. When no protection is in place, there is a big change the end-user will notice something fishy is going on. Proper USB Class filtering policies and a daemon that monitors typing speed will put this kind of attacks to a halt. To bypass current security mechanisms (including USB hardware firewalls), I have developed Keynterceptor. This is a proof of concept keyboard implant that is able to capture and inject keystrokes and communicate over the air via a back-channel while keeping the local time.

Since Keynterceptor is made up from very affordable, off-the-shelf electronic parts, it is likely that such an attack tool can be created and used by someone with few resources. I will demonstrate the effectiveness of Keynterceptor in a real-world scenario where an end-point gets compromised. I will also be present at the Hardware Hacking Village in the CommSec area where you can come and check out the Keynterceptor yourself!

===

Niels is a lead analyst at the CSIRT of a large organization in the Netherlands. He is a profound advocate of open standards and open-source software. Niels previously built monitoring and incident handling teams and performed network intrusion tests at current and previous jobs. He holds a bachelor’s degree in embedded systems and a master’s degree in computer science. His main interests lie in anomaly detection, hardware hacking and traffic anonymisation.

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]