Time
2 hours 25 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
and last year's of videos. We saw what USB drop tax are and why they were so effective.
00:05
And these series of videos will be digging a little deeper and seeing what different types of us be. Drop tax There are.
00:12
So first we'll look at the USB human interface device moving attack these air devices that emulate keyboards. The second type attack is a malicious file slash code attack, and these thieves use everyday flash drives.
00:27
Next, we'll be looking at social sharing link attack, and these can use every day flash drives or
00:32
H i D devices. So we'll take a look. That one, uh, the next one will be us be killed devices these air rather nasty on. I'll show you why in a moment
00:43
the last one is thes zero day attack that uses zero day vulnerabilities already, So let's get into it.

Up Next

USB Drop Attack

Malicious devices are everywhere these days, whether you can see them or not.

Instructed By

Instructor Profile Image
Shawn Briere
Information Security Analyst
Instructor