2.2 USB Human Interface Drive Spoofing - UA

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

2 hours 25 minutes
Video Transcription
in this video, I'll be discussing the first type of us be dropped. Tak called the human interface device spoofing Attack or H I d. Spoofing for short.
We'll see how this type of attack works by masquerading as a keyboard.
Now, before you really understand this type of attack, we have to understand what human interface devices are now. These air devices that attach the computer via the USB poor are other ports that allow humans to input some sort of data to the computer
or allows the machine to provide some sort of output to the humans.
There's many examples. For example, keyboards allows humans to input keystrokes. Computer or headphones allows the computers to fight audio. Out to the humans are other devices clued mice and microphones, a swell as many others.
Now what H I D spoofing devices are is they masquerade as keyboards and do some sort of pre program pre program keystrokes and two machine.
So one of these, when these devices get plugged in ah computer. The computer just sees it as a keyboard and they think a humanist typing on it on a reality. It's its own separate device. Doing these pre program keystrokes.
Now this type of attack has the advantage of being very versatile. Thes attacks can be used across different operating systems because, of course, almost every machine out there requires a keyboard.
So these attacks can be used against Lennox Windows. Mac OS, you name it. Theater Hacker just has to know what they're attacking and program the device accordingly.
Now, there's several different options out there for four devices like this.
Um, now you can't just use any old device. You have to use devices that support keyboard emulation. Um, and this course will be using the picture on top, which is called the USB rubber Ducky. Now the advantage
This device, I believe has is the only one that has a
enclosure to make it look like a normal USB flash drive. I don't know of any other device out there that has that. Of course you can put enclosures on other devices, but this is the only one sold like that there. There's another version out there called mild. We knows
you see the two pictures below the top on those arm, lt knows,
And that's what by Mel Tronics. No, uh, not only does uh, use rubber ducky have a case, but, uh, Mallory knows are actually much cheaper. So if you prefer that device, you can go ahead and pick that one up.
Now, you can also build your own USB H i D. Smoothing devices from our Galina boards. And I think that's what Mel Dewey knows where actually are mildly. No boards.
Um, and you can also use specific USB flash drives. This does require a little bit more know how and set up, and, well, we won't be going over that in this course. But just know that that option is out there for you.
Now, these these devices use a specific type of scripting language called ducky script. This is a very simple language that basically does anything a keyboard could do.
Um, so if you haven't seen this scripting language before, don't worry. It's very easy to pick up. It just takes some time to get used to. But, uh, most people can pick this up very quickly.
Now there are a few drawbacks. This this type of attack,
these devices must be finished very quickly. Their attack must be very quick on the reason behind that is Ah, Lot of times victims may plug these devices in and May may see something they don't like. People get very paranoid. So if an attacker
isn't hiding their their payloads properly,
ah, victim and unplugged the device before it finishes.
Also, sometimes people may be impatient, and if they don't see any storage being shown after they plug in advice, they might also unplug it as well. So it's It's very crucial that thes types tax are are made very quickly
because if they're very slow, there's a good chance that
that someone won't plug these devices before they finish.
Up Next
USB Drop Attack

Malicious devices are everywhere these days, whether you can see them or not.

Instructed By