Description: There are many great “Do It Yourself” security testing hardware projects
out there. The problem for most people is the time and expertise it
takes to construct and operate them. I will be introducing The Glitch as
a simple to use, plug-and-play, open source, security testing hardware
platform. With this project there is no need to solder or write code,
unless that’s your thing. To make things easy, all user configuration
is done on a Micro SD card. Users can select from multiple
pre-configured modules using a small DIP switch. Have it set to target
a Windows system, flip a switch, and instead run your OSX attack module.
That’s great and all, but what does it do? I will be demonstrating a
few projects currently available for The Glitch. You will see how to
use keystroke injection to do things like set up a reverse SSH
connection off a live cd, record keystrokes and replay them with the
keylogger setup, embed the hardware into USB attached devices, and
expand The Glitch to work with technologies like Bluetooth, RFID/NFC,
and more.
Speaker(s):
JP Dunning “.ronin”
BIO:
JP “.ronin” is a security researcher and consultant. His research interests focus primarily on wireless and portable security. He is the primary developer on Katana USB drive and various other open source projects. He maintains www.hackfromacave.com for publishing projects and research.
Tags: securitytube , hacking , hackers , information security , convention , computer security , derbycon-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.