Description: How much do you trust the hardware shipped to your office or purchased at the local computer store. It may surprise you how easy it can be to change hardware into a Trojan. This presentation will show attendees how they can change computer peripherals from around the house into an attack platform. The great thing is you don't need a great understanding of hardware to leverage this attack.
I have created a special hardware attack platform called The Glitch. It is a small reprogrammable multipurpose device designed specifically for security testing. As part of its functionality, it has been designed to embed in existing hardware; making it a unique attack vector.
In addition to modifying hardware, attendees will also learn about threats from modified firmware. The ever-growing open source community loves to create/modify existing firmware on embedded devices. We will briefly discuss the impact of modified firmware as a staging point inside a corporate network.
For More Information please visit : - https://www.blackhat.com/
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.