Attacking Encrypted USB Keys the Hard(ware) Way

by Jean-Michel Picod, Rémi Audebert, Elie Bursztein
Sept. 13, 2017 1 comment Pen Testing & Audits attacking usb

In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives. We will demonstrate how this methodology works in practice via a set of case-studies. We will demonstrate some of the practical attacks we found during our audit so you will learn what type of vulnerability to look for and how to exploit them. Armed with this knowledge and our tools, you will be able to evaluate the security of the USB device of your choice.

Steven Ulm 9 months ago

I truly seen the ways (the hard ways :) ) through with encryption can fail... good presentation!