Time
2 hours 25 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
In the last video, we discussed the social engineering link attack, and this video will be talking about perhaps the most destructive USB tack of all the USB kill attack. Now, the reason these attacks air so destructive because they're built to destroy whatever they're plugged into.
00:17
Basically, what these devices do is once it's plugged into of advice, this device will draw the power from the advice it's plugged into charge capacitor. And then once it reaches a certain voltage, it'll discharge that voltage into the machine it's pulling into.
00:34
Now, USB devices basically have two lines. They have a data line for communication and power line, so these devices air pulling power from the power line and then discharging it through the data line.
00:48
Now this device will do this continuously until either the machine is destroyed or the person appliques device.
00:58
Now the vast majority of devices are not protected against this type attack. So, unfortunately, if if this device have plugged in, there's a good chance that it's gonna destroy that device. Another air legitimate uses for this device. It's to test whether machines can withstand this,
01:18
but a lot of times thes aren't used for that on instead are used to destroy machines
01:26
Now. These devices also come with adapter, so they could be plugged into other devices, like smartphones.
01:33
They come with micro USB adapters, which are used by a lot of android phones. You SBC adapters, which have started, replaced the micro USB and also used by a lot of android phones. They also come with lightning cable adapters, which are used by apple devices.
01:51
Now there's a logo on some of these devices that you see in the slight here. So if you ever see that logo on advice, just be very cautious and don't plug you into anything.
02:02
Uh, then that that version they have with logos called the Standard version
02:07
it's it's sold by a certain company. They also have another version called the Anonymous Version.
02:14
Um, and this does not have any markings whatsoever, which makes it
02:19
even more dangerous because you can't differentiate it from a normal USB device, making it very dangerous. So if you see this logo, I would just steer clear of those devices because they can destroy almost any machine you have

Up Next

USB Drop Attack

Malicious devices are everywhere these days, whether you can see them or not.

Instructed By

Instructor Profile Image
Shawn Briere
Information Security Analyst
Instructor