USBdriveby - exploiting USB in style

USBdriveby - exploiting USB in style

USBdriveby ( is a device you stylishly wear around your neck which can quickly and covertly install a backdoor and override DNS settings on any unlocked machine via USB in a matter of seconds. It does this by emulating a keyboard and mouse, blindly typing things, flailing the mouse pointer around and weaponizing mouse clicks.\rbr\rbrA version for Windows and OS X is available on github.\rbr\rbrIt also evades several security measures in OS X, including hacking the accessibility settings, window positioning, overriding network settings, and disabling portions of the Little Snitch firewall.\rbr\rbrBy Samy Kamkar\rbr\rbrWant to attack *locked* or password protected computers? Then check out PoisonTap: \rbr\rbrSubscribe to my channel for more Applied Hacking videos: \rbrFollow me on Twitter: \rbr\rbrMore USBdriveby details: \rbrAlso check out BadUSB: \rbr\rbrMusic by Epoch Rises: \rbraka USB Driveby USB Drive By\rbr\rbrWINDOWS VERSION\rbrA Windows version is available on the Github linked from \rbr\rbrAnother user posted an alternate version for Windows: \rbr\rbrFOR LINUX: You can simply open a terminal, add a new directory to the beginning of $PATH, install a malicious sudo in that user-owned path that siphons credentials and performs the same attacks and more (and still send the sudo password to the real sudo to prevent the user from noticing.)\rbr\rbrDETECTING OPERATING SYSTEM: You can detect OS by the unique way each OS communicates with the USB device.


User: Yevisamuk

Views: 19

Uploaded: 2018-01-14

Duration: 10:00

Your Page Title