AVR/V-USB combo tool hacks Win 7
András Veres-Szentkirályi, IT security expert, OSCP, GWAPT, writes, “I’ve built a device that acts as a USB HID keyboard, enters a script as a series of keystrokes into a PC, which can extract itself into an executable. This in turn can send files on the PC back to the device using the NUM/CAPS/SCROLL lock LED status reports, so it can be used to transfer files into and out from PCs that are locked down, so that only a display/keyboard/mouse can be connected to it.” He built this device as part of a presentation at the recent Hacktivity 2012 conference. The presentation slides can be downloaded as a 16-page PDF from the Silent Signal homepage.
The whole story can be found in on András VSzA techblog along with links to all the source code and schematics.
Via the contact form.This entry was posted in AVR, hacks, open source, security, USB and tagged Atmega328, data extraction, HID, keyboard, V-USB.