Replication Through Removable Media

In this course, students will learn the basics of how an adversary can use removable media devices to not only gain access to an unauthorized host, but also enable autorun scripts to download additional infrastructure and payloads to a victim host.

Time
1 hour 35 minutes
Difficulty
Intermediate
CEU/CPE
2
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Content
Module 1: Introduction
Campaign Overview
15m
Module 2: What is Technique T1091?

2.1Attack, Detect and Mitigate

20m

2.2Raspberry Robin Lab

1h
Course Description

This course will cover the technique:

T1091: Replication Through Removable Media. Threat actors can compromise an internally hosted system by plugging in a USB drive preloaded with canned autorun files to carry out and establish persistence. There are multiple approaches to exactly how this can be accomplished, but in this course, we will focus on what this activity looks like within your logging solution. Whether the threat actor could physically break into your company and plug in the drive or leave it on the ground for an internal user to pick up is up to your imagination.

Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.

Instructed By
Matthew Mullins
Matthew Mullins
Technical Manager, Red Team
Instructor
Owen Dubiel
Owen Dubiel
Security Engineer
Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Replication Through Removable Media Certificate of Completion