DEFCON 20: bypassing endpoint security with USB keys
This entry was posted in hacks, security, USB, Videos and tagged Defcon.
In this talk from the DEFCON 20 conference, Phil Polsta, Computer Security Professor at the University of Dubuque discusses the relative insecurity of using USB “keys” as a way of restricting access to tech resources. He explains in detail how any USB mass storage (flash or hard) drive can be made to appear as an authorized device. The devices can be built for between $18 and $30, and depending on the technique employed the hack requires little or no soldering, and only a basic knowledge of MCUs and C programming.