Replication Through Removable Media

In this course, students will learn the basics of how an adversary can use removable media devices to not only gain access to an unauthorized host, but also enable autorun scripts to download additional infrastructure and payloads to a victim host.

Course Content

Attack, Detect and Mitigate


What is Technique T1091?
Raspberry Robin Lab


What is Technique T1091?
Course Description

This course will cover the technique:

> [T1091]( Replication Through Removable Media. Threat actors can compromise an internally hosted system by plugging in a USB drive preloaded with canned autorun files to carry out and establish persistence. There are multiple approaches to exactly how this can be accomplished, but in this course, we will focus on what this activity looks like within your logging solution. Whether the threat actor could physically break into your company and plug in the drive or leave it on the ground for an internal user to pick up is up to your imagination.

Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.

This course is part of a Career Path:
No items found.

Instructed by

Master Instructor
Matthew Mullins

Matt has led multiple Red Team engagements, ranging from a few weeks to a year and covering multiple security domains. Outside of Red Teaming, Matt is also a seasoned penetration tester with interests in: AppSec, OSINT, Hardware, Wifi, Social Engineering, and Physical Security. Matt has a Master's degree in Information Assurance and an exhaustive number of certifications ranging from frameworks, management, and hands-on hacking. Matt is a Technical SME at Cybrary, focusing on Adversarial Emulation and Red Teaming for course content.

Owen Dubiel

Owen is certified in the GIAC GSEC, CompTIA CySA+, and various other vendor-related certifications. He works both as a technical security engineer and as an SME architect instructor in his spare time. Spreading the word of cyber security is a passion of his. Owen lives in Southeast Michigan with his beautiful wife, daughter, and his dog, Thor. In his free time, Owen enjoys watching sports and movies, and spending time with his family.

Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Replication Through Removable Media Certificate of Completion