Time
2 hours 25 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
in the last video we talked about re kon and what questions Attackers have to answer to make their tax more successful.
00:06
In this video, we're gonna talk about deployment and what Attackers do to make their devices more desirable to take.
00:12
All right, so the attacker has done their reconnaissance, and out comes the deployment phase piece cake, Right? Well, maybe not exactly. So of course, this this should be done after the attacker does their reconnaissance and Taylor makes her attack. Um, it may not be super easy to actually,
00:31
when the appointment comes, they
00:33
they have to do things to make the device desirable. To take a lot of times, Attackers will put devices on key chains with keys like like you see in the picture with the USB device with a bunch of those keys to maybe playing the victims
00:53
desire to help.
00:54
So the victim all plugged and see who it belongs to. Maybe we'll put a label on it, making enticing maybe something like confidential on it
01:03
and a lot of time Seville distress devices to make them look used and warn or any number of combination of things like that.
01:12
Um, so Attackers really need to do their homework and plan a good deployment strategy. They don't want to look suspicious at all because I could get them caught. They need to act like they belong where they're going to go.
01:30
Say, for example, it's a a business building with everyone wearing suits. So maybe it's not a good idea for the attacker to walk in there with jeans and a T shirt. That big beard. Maybe Maybe they should dress up as soon as, well, the clean shaven. It'll certainly get less attention attracted to them.
01:48
They also don't do it won't just be throwing these devices out in front of them.
01:53
They want to be just laying them down. Maybe acting like they dropped it will sit on a bench or something. Make it make it subtle.
02:01
So it's also typical to deploy several devices at once because a lot of times one isn't gonna cut it. Maybe there's a 50 50 chance, so you want more to increase those odds of one device getting taken.
02:17
And, uh, it's also not a good idea to be laying multiple of the devices out at once because that in itself is suspicious because seeing a bunch of just USB devices. Maybe the old look similar. That's that's gonna tip off some people that maybe think there's something going on there, so
02:37
usually they just deploy one at a time
02:38
and spread out the times at this point.

Up Next

USB Drop Attack

Malicious devices are everywhere these days, whether you can see them or not.

Instructed By

Instructor Profile Image
Shawn Briere
Information Security Analyst
Instructor