In the past couple of years, USB devices have become more and more common, USB storage, keyboards, mice, wireless networks even USB cup warmers, but as we plug more and more into our personal and work devices, where is the line crossed and by how much?
You’ll start off by learning what a badUSB is, how an attack can be carried out and what attacks are available. From there, you’ll develop and create attacks that when used in real-life can cause mayhem, depending on the payload and the effect you - as the attacker - want it to have.
This activity is aimed towards beginners, but anyone who is interested is welcome!
*What you’ll need to bring*
- A laptop with windows or linux as the primary OS (sorry Mac users!),
- Virtual Machine with Windows 7/10, Ubuntu and a Kali installed for the attacks to be tested on.