SlideShare ist ein Scribd-Unternehmen logo
1 von 111
Downloaden Sie, um offline zu lesen
Controlling USB Flash Drive
Controllers:
Exposé of hidden features
Richard Harman
Shmoocon 2014
Richard Harman
●

InfoSec Analyst for ~10 years

●

Lead Intrusion Analyst at SRA SOC
–

Malware analysis

–

Perl scripting

–

Incident Response & all around SysAdmin-fu

@xabean

warewolf

Richard@RichardHarman.com
Hacking USB thumb drives
#B
ad
BI
OS
#BadBIOS ... features ?
1) Spread via USB flash drives
2) Infect USB flash drive firmware
3) Infect host firmware
4) Cross-platform
5) Cross-operating system
6) IPv6 networking
7) Audio-based communication for bridging air-gaps
What?
Overview
●

USB mass storage hardware

●

Hardware Disassembly

●

Block-level Components

●

●

Flash Controller Identification & Their
Features
Reprogramming Flash Controllers
USB Mass Storage
Data, Power, controller board,
IDE HDD
2.5”, SATA, controller board
USB3 flash drive
USB HDD
basic components
USB SATA HDD
Controller/Power board
●

Host Interface

●

Power
USB SATA HDD
Controller/Power board
●

Host Interface

●

Power
USB SATA HDD
Controller/Power board
●

USB differential signaling pins
USB SATA HDD
Controller/Power board
●

Device Interface

●

Bridge/Controller
USB SATA HDD
Controller/Power board
●

SATA differential signaling pins (2 pair)
USB SATA HDD
Controller/Power board
●

Device Interface

●

Bridge/Controller
Controller/Bridge
HDD v.s. Flash
●

HDD (Bridge)
–
–

●

USB → HDD protocol translation
Generic firmware - host sees what is connected

Flash (Controller)
–

Logical mapping LBAs to Flash Memory

–

Controller can be reprogrammed!

–

Host sees what the controller wants!!
USB Flash Drive
PCB
Basic Components of Flash drives
●

Controller ASIC

●

Flash Memory
Basic Components of Flash drives
●

Controller ASIC

●

Flash Memory
USB Mass Storage
●

Signaling: Differential Voltage

●

Speed: 6MHz, 12MHz, 24MHz, 2.5GHz (SS)

●

●

Bridge/Controller chip translates USB to
storage device
No direct translation from USB-MS
protocol to SATA/IDE protocol or Flash
Chips
USB Mass Storage == SCSI
●

●

●

●

USB-MS is encapsulated SCSI
Subset of SCSI commands, based on
peripheral type
Encapsulation can cause trouble (smartmon,
smartctl, etc)
Generally one SCSI target, one or more
Logical Units (LUNs)
USB signaling
Differential Signaling
Phison Security Tool
Low-Level Sniffing USB
●

Logic Analyzer
–
–

Too much detail

–
●

Low level
No protocol-in-protocol decoding

Hardware MITM device
–

Low level

–

See Dominic's talk tomorrow
Saleae Logic8
●

USB2 based logic analyzer

●

v1.1.18 beta software supports USB

●

USB2 sniffing a USB2 device? Inconceivable!
–

Use a USB1 hub to slow down target.

–

Vampire tap lines
Sniffing rig
(USB extension cable)
Sniffing rig
Results! … no context though
High-Level Sniffing USB
●

USBPcap (self-snoop) + Wireshark
–

●

Virtualization dumping USB
–

●

Windows, High level, can/will miss data
Full & complete dump

Linux usbmon → tcpdump -i usbmon2
–

Lots of tools to inspect

–

Wireshark!
●

USB decoding, USB-MS decoding
Sniffing USB
Virtualization + usbmon dumping USB
Re-implementing USB Flash
Drive Security Features Under Linux
●

Disable LUN Protection:
# echo -n password | sg_raw -s 8 /dev/sg3 
0E 00 01 55 AA 00

●

Unlock LUN:
# echo -n password | sg_raw -s 8 /dev/sg3 
0E 00 00 00 00 00
Re-implementing USB Flash
Drive Security Features Under Linux
●

Change Password / Lock LUN:
# perl -e 'print pack("a16 a16 a32",
"old pass", "new pass", "pw hint")' | 
sg_raw -v -s 64 /dev/sg3 0E 06 01 00 00 00
UP21 Flash Controller
UP21 Flash Controller
Consumer Flash
Drive Vendors
●

SanDisk

●

Patriot

●

Kingston Digital

●

ADATA

●

Lexar

●

Silicon Power

●

PNY

●

Transcend

●

HP

●

Verbatim

●

Sony

●

Toshiba

●

TDK

●

Lenovo
OEM Flash
Controller Vendors
●

Phison

●

Ameco

●

ALCOR

●

ChipsBank

●

Innostor

●

Efortune

●

Skymedi

●

Icreate

●

Silicon Micro

●

Netac

●

Solid State System

●

OTI

●

USBest

●

Prolific
Who uses what?

?
Silicon Motion (SMI)

x1
Alcor

Phison

x1

x1

Consumer
Vendor
Innostor

x1

Skymedi

x1
x1
Solid State System (SSS)
Silicon Motion (SMI)
Alcor

Phison

x1

Verbatim
Skymedi

Innostor

Solid State System (SSS)
Silicon Motion (SMI)
Alcor

Phison

x2

Intel
Skymedi

Innostor

Solid State System (SSS)
Silicon Motion (SMI)
Alcor

Phison

x3

TDK
Skymedi

Innostor

Solid State System (SSS)
Silicon Motion (SMI)
Alcor

Phison

x1

x3

Lenovo
Skymedi

Innostor

Solid State System (SSS)
Silicon Motion (SMI)

x1
Alcor

Phison

x1

x3

Sony
Skymedi

Innostor

Solid State System (SSS)
Silicon Motion (SMI)

x2
Alcor

Phison

x1

x3

Corsair
Skymedi

Innostor

Solid State System (SSS)
Silicon Motion (SMI)

x2
Alcor

Phison

x1

x3

Toshiba
Skymedi

Innostor

x1
Solid State System (SSS)
Silicon Motion (SMI)

x3
Alcor

Phison

x2

x3

Trend Micro
Skymedi

Innostor

x1

x1
Solid State System (SSS)
Silicon Motion (SMI)

x4
Phison

Alcor

x2

x3

ADATA
Skymedi

Innostor

x2

x1
Solid State System (SSS)
Silicon Motion (SMI)
Phison

x5

Alcor

x3

x4

Silicon Power
Skymedi

Innostor

x3

x1
Solid State System (SSS)
Silicon Motion (SMI)
Phison

x6

Alcor

x4

x5

Kingston
Skymedi

Innostor

x4

x1
x2
Solid State System (SSS)
Flash drive lineup
●

All purchased at Micro Center

●

Tried to get as different as possible ........
Which controller?

?
Which controller brand?

?
Phison

Phison

SMI

USBest

Phison

Phison

Phison

SMI

Innostor

Which controller brand?
Flash Lineup: Controller Chips
Count

Brand

Chip

1

Innostor

IS916E

2

Phison

PS2251-61

1

Phison

PS2261-68

1

Phison

PS2251-03

1

Phison

PS2251-67

2

Silicon Motion SM3257ENLT
Microcenter 4G USB2
●

4G @ $5

●

Phison PS2251-61
–

Supports multiple LUNs

–

Supports hidden LUNs

–

Supports PW protected LUNs
Centeon
Jezebel Licorice
●

8GB @ $8

●

SMI SM3257ENLT
–

Supports multiple LUNs

–

Supports hidden LUNs

–

Supports PW protected LUNs
Centeon
Secure
●

8GB @ $17

●

Phison 2251-61
–

Supports multiple LUNs

–

Supports hidden LUNs

–

Supports PW protected LUNs

●

No HW Crypto support

●

Contains LUN w/ crypto SW
Which would you buy?
●

8GB @ $8 Centeon Jezebel Licorice
–

All the Flash controller features

–

Use FREE PGP or Truecrypt

OR
●

8GB @ $17 Centeon Secure
–

2x as expensive

–

No additional benefits
Monolithic USB Close-Ups
http://www.bunniestudios.com

@BunnieStudios
http://www.bunniestudios.com

@BunnieStudios
http://www.bunniestudios.com

@BunnieStudios

Monolithic v.s. PCB
http://www.bunniestudios.com

@BunnieStudios

Monolithic v.s. PCB
Monolithic v.s. PCB
(to scale)
Visual Flash Controller
ASIC Identification
●

●

Destroys/mangles device housing
Consumer packaging never mentions
controllers

●

OEMS use anything (Kingston)

●

Monolithic drives are epoxied

●

I don't have nitric acid + fume hood.
Software Flash Controller
ASIC Identification
●

OS sees what the ASIC wants it to

●

USB PID:VID is supposed to be useful

●

lsusb & friends are useless

●

Need to talk to the ASIC directly

●

No OS tools to talk to ASIC

●

What software?
ChipEasy
ChipEasy
Picking on Phison
●

●

Taiwan based Flash controller ASIC
manufacturer
Controller interfaces: USB 1/2/3, SATA, IDE,
eMMC, SD & more

●

Core CPU: Intel 8051 (on-die)

●

Hardware AES-256 (in some controllers)

●

Multiple device “modes”
Flash ASIC-based Crypto...
1) Flash controllers do wear-leveling
2) Encryption key may be held in the ASIC,
initially set during ASIC programming
3) LUNs (drives) can be hidden, locked w/
password AND encrypted
4) Flash drives have more space than you know

This is a forensics NIGHTMARE
PS2251 Series Flash Modes
(Logical Units)
Mode #

LUN0

(common) 3

HDD

7

HDD

HDD*

8

HDD*‡

HDD‡

HDD

HDD

(common) 21

CD

HDD

30

CD

31

CD

HDD*

32

CD

CD

14

LUN1

* LUN invisible until unlocked w/ app
‡ Only one LUN visible at a time

LUN2

CDROM

HDD
No more U3 drives!
●

●

Mode 21 is “U3” like
U3 drives are dead as of 2009 thanks to
Microsoft & SanDisk
–
–

●

Superseded by “StartKey”
Appears to be related to “Windows 2 Go”

Flash drives you already have most likely
support mode 21.
PS2251 Block Diagram
Hello, Intel 8051
Bunnie & xobs @ 30C3
“SD Card Hacking”
●

●

●

Re-purposing 8051 MCU inside SD cards
Arbitrary code execution on controller in SD
Cards
Most likely will work with these flash drives
too, similar controllers

●

RE'd a controller, wrote a debugger!

●

8051 is an “IP” core – it's EVERYWHERE
MOOSEDRIVES
(NOT FOR SALE, SORRY)

4GB Flash
$5 Microcenter Brand
Phison 2251-61
SECRETMOOSE
Features:
●

USB PID:VID 1337:1337

●

4GB Public partition
–

●

Containing windows unlock app

1-3G Secure (hidden) partition (recovered space)
–

Password protected, unlock w/ Windows app

–

5 guesses, 6th failed attempt erases device .. or not.
●

Windows app appears to do wiping
PORTABLEMOOSE
Features:
●

Fedora 19 LiveCD image
–
–

Reset Persistent storage

–
●

Bootloader Modified for persistent overlay
Non-persistent boot

3G overlay storage
Not just portable apps, an entire portable OS.
REDMOOSE
Features:
●

32bit Kali Linux CDROM image

●

1.5G storage
Which is for you?
●

ISOSTICK
–

●

CDEMU
–

●

$99, uSD (up to 64g), “isosel” boot loader
Open source project, still in development

Regular thumb drives
–

$0 - $??

–

A little of your time + varying levels of “fun”
(Re)programming Phison Controllers
●

Foolproof/Easy Mode:
–
–

●

Mode Converter
Switch between different modes easy

Dangerous/Advanced:
–

MPAll

–

GetInfo utility bundled (more info than ChipEasy)

–

Change firmware, partitioning, USB identification,
password lock, enable crypto (if supported)
Phison ModeConverter
Phison MPAll
MPAll Partitioning (LUNs)
Configurable Settings
●

Drive Size

●

Set LUNs R/O

●

Multi-LUN

●

LUN PW Protect

●

Device IDs & Strings

●

Turn LED on/off

●

Emulate CDROMs

●

Memory voltages

●

Serial Number

●

Reformat (recover)

●

# of ECC bits

●

Memory Timing
Phison MPAll Troubleshooting
●

Use ChipEasy Flash ID to help

●

Try the latest version of MPAll

●

Be prepared to brick drives! (until you learn)

●

Find Controller Firmware updates

●

●

IDBLK_TIMING.dll updates – Updated Flash ID
& Timing params
Tripple check Flash ID & Timings are correct
UnRAID, by Lime Technology
●

Slackware based commercial NAS solution

●

Different Tiers for supported # of HDD:
–

●

Cost per Server:
–

●

Free: <= 3, Plus: <= 7, Pro: <= 24
Free: $0, Plus: $69, Pro: $119

Licensing Method:
–

27 character USB Flash drive GUID
Not so globally unique
lime-technology.com/registration-keys/
●

Example GUID:
–
–

●

058F-6387-0000-0000B65F1E82
This was an Alcor Flash Drive s/n: B65F1E82

www.linux-usb.org/usb.ids
–

VID 058F: Alcor Micro Corp

–

PID 6387: Flash Drive
Cloning an unRAID
Registration Key
1) Set USB VID and PID to match
2) Set Serial number to match
3) Win!

Please use a real hardware security
token like the Aladdin HASP.
Looking for a HW USB Sniffer?
●

See Dominic's Talk tomorrow:
–

●

An Open and Affordable USB Man in the Middle
device

No public documentation on programming flash
controllers

●

Windows + USBpcap + Wireshark insufficient :(

●

No Linux support
–

usb_modeswitch has no idea about these controllers
Similar Work / Research
●

2013: Bunnie & xobs
–

30C3 – SD Card Hacking
http://www.bunniestudios.com/blog/?p=3554

●

2013: Bunnie
–

Where USB memory sticks are born
http://www.bunniestudios.com/blog/?p=2946

●

2011: Wesley McGrew @McGRewSecurity
–

Hacking U3 drives
http://mcgrewsecurity.com/pub/hackingu3
Similar Work / Research
●

2010: Digital Forensics Research Center – Korea
–

●

Secure USB Bypassing Tool
http://www.dfrws.org/2010/proceedings/bang.pdf

2010: SySS
–
–

●

PW protected flash drives unlocked w/ single command
http://www.darkreading.com/security/news/222200174

2008: Russel Butturini / TCSTool
–

Incident Response U3 Switchblade
Links & Contact
ChipEasy: Google “Chipeasy English”

flashboot.ru
usbdev.ru
usb-fix.blogspot.com
upan.cc

xabean

warewolf

richard@richardharman.com

Weitere ähnliche Inhalte

Was ist angesagt?

Debian or Yocto Project? Which is the best for your Embedded Linux project?
Debian or Yocto Project? Which is the best for your Embedded Linux project?Debian or Yocto Project? Which is the best for your Embedded Linux project?
Debian or Yocto Project? Which is the best for your Embedded Linux project?Chris Simmonds
 
Build a Deep Learning Video Analytics Framework | SIGGRAPH 2019 Technical Ses...
Build a Deep Learning Video Analytics Framework | SIGGRAPH 2019 Technical Ses...Build a Deep Learning Video Analytics Framework | SIGGRAPH 2019 Technical Ses...
Build a Deep Learning Video Analytics Framework | SIGGRAPH 2019 Technical Ses...Intel® Software
 
不揮発メモリ(NVDIMM)とLinuxの対応動向について(for comsys 2019 ver.)
不揮発メモリ(NVDIMM)とLinuxの対応動向について(for comsys 2019 ver.)不揮発メモリ(NVDIMM)とLinuxの対応動向について(for comsys 2019 ver.)
不揮発メモリ(NVDIMM)とLinuxの対応動向について(for comsys 2019 ver.)Yasunori Goto
 
The TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux KernelThe TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux KernelDivye Kapoor
 
The Forefront of the Development for NVDIMM on Linux Kernel
The Forefront of the Development for NVDIMM on Linux KernelThe Forefront of the Development for NVDIMM on Linux Kernel
The Forefront of the Development for NVDIMM on Linux KernelYasunori Goto
 
DerbyCon 2014 - Making BadUSB Work For You
DerbyCon 2014 - Making BadUSB Work For YouDerbyCon 2014 - Making BadUSB Work For You
DerbyCon 2014 - Making BadUSB Work For YouAdam Caudill
 
20181016_pgconfeu_ssd2gpu_multi
20181016_pgconfeu_ssd2gpu_multi20181016_pgconfeu_ssd2gpu_multi
20181016_pgconfeu_ssd2gpu_multiKohei KaiGai
 
Understanding eBPF in a Hurry!
Understanding eBPF in a Hurry!Understanding eBPF in a Hurry!
Understanding eBPF in a Hurry!Ray Jenkins
 
BGP Unnumbered で遊んでみた
BGP Unnumbered で遊んでみたBGP Unnumbered で遊んでみた
BGP Unnumbered で遊んでみたakira6592
 
Ipmi Server Management
Ipmi Server ManagementIpmi Server Management
Ipmi Server Managementsjtu1234567
 
Backup and Restore with pfSense 2.4 - pfSense Hangout August 2017
Backup and Restore with pfSense 2.4 - pfSense Hangout August 2017Backup and Restore with pfSense 2.4 - pfSense Hangout August 2017
Backup and Restore with pfSense 2.4 - pfSense Hangout August 2017Netgate
 
Linux Internals - Kernel/Core
Linux Internals - Kernel/CoreLinux Internals - Kernel/Core
Linux Internals - Kernel/CoreShay Cohen
 
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareHKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareLinaro
 
覚えておきたい! zypper コマンドの使い方
覚えておきたい! zypper コマンドの使い方覚えておきたい! zypper コマンドの使い方
覚えておきたい! zypper コマンドの使い方Fuminobu Takeyama
 
不揮発メモリ(NVDIMM)とLinuxの対応動向について
不揮発メモリ(NVDIMM)とLinuxの対応動向について不揮発メモリ(NVDIMM)とLinuxの対応動向について
不揮発メモリ(NVDIMM)とLinuxの対応動向についてYasunori Goto
 
Process Address Space: The way to create virtual address (page table) of user...
Process Address Space: The way to create virtual address (page table) of user...Process Address Space: The way to create virtual address (page table) of user...
Process Address Space: The way to create virtual address (page table) of user...Adrian Huang
 
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...DefconRussia
 
Find your own iOS kernel bug
Find your own iOS kernel bugFind your own iOS kernel bug
Find your own iOS kernel bugGustavo Martinez
 
P4, EPBF, and Linux TC Offload
P4, EPBF, and Linux TC OffloadP4, EPBF, and Linux TC Offload
P4, EPBF, and Linux TC OffloadOpen-NFP
 
ALSS14: Xen Project Automotive Hypervisor (Demo)
ALSS14: Xen Project Automotive Hypervisor (Demo)ALSS14: Xen Project Automotive Hypervisor (Demo)
ALSS14: Xen Project Automotive Hypervisor (Demo)The Linux Foundation
 

Was ist angesagt? (20)

Debian or Yocto Project? Which is the best for your Embedded Linux project?
Debian or Yocto Project? Which is the best for your Embedded Linux project?Debian or Yocto Project? Which is the best for your Embedded Linux project?
Debian or Yocto Project? Which is the best for your Embedded Linux project?
 
Build a Deep Learning Video Analytics Framework | SIGGRAPH 2019 Technical Ses...
Build a Deep Learning Video Analytics Framework | SIGGRAPH 2019 Technical Ses...Build a Deep Learning Video Analytics Framework | SIGGRAPH 2019 Technical Ses...
Build a Deep Learning Video Analytics Framework | SIGGRAPH 2019 Technical Ses...
 
不揮発メモリ(NVDIMM)とLinuxの対応動向について(for comsys 2019 ver.)
不揮発メモリ(NVDIMM)とLinuxの対応動向について(for comsys 2019 ver.)不揮発メモリ(NVDIMM)とLinuxの対応動向について(for comsys 2019 ver.)
不揮発メモリ(NVDIMM)とLinuxの対応動向について(for comsys 2019 ver.)
 
The TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux KernelThe TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux Kernel
 
The Forefront of the Development for NVDIMM on Linux Kernel
The Forefront of the Development for NVDIMM on Linux KernelThe Forefront of the Development for NVDIMM on Linux Kernel
The Forefront of the Development for NVDIMM on Linux Kernel
 
DerbyCon 2014 - Making BadUSB Work For You
DerbyCon 2014 - Making BadUSB Work For YouDerbyCon 2014 - Making BadUSB Work For You
DerbyCon 2014 - Making BadUSB Work For You
 
20181016_pgconfeu_ssd2gpu_multi
20181016_pgconfeu_ssd2gpu_multi20181016_pgconfeu_ssd2gpu_multi
20181016_pgconfeu_ssd2gpu_multi
 
Understanding eBPF in a Hurry!
Understanding eBPF in a Hurry!Understanding eBPF in a Hurry!
Understanding eBPF in a Hurry!
 
BGP Unnumbered で遊んでみた
BGP Unnumbered で遊んでみたBGP Unnumbered で遊んでみた
BGP Unnumbered で遊んでみた
 
Ipmi Server Management
Ipmi Server ManagementIpmi Server Management
Ipmi Server Management
 
Backup and Restore with pfSense 2.4 - pfSense Hangout August 2017
Backup and Restore with pfSense 2.4 - pfSense Hangout August 2017Backup and Restore with pfSense 2.4 - pfSense Hangout August 2017
Backup and Restore with pfSense 2.4 - pfSense Hangout August 2017
 
Linux Internals - Kernel/Core
Linux Internals - Kernel/CoreLinux Internals - Kernel/Core
Linux Internals - Kernel/Core
 
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareHKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
 
覚えておきたい! zypper コマンドの使い方
覚えておきたい! zypper コマンドの使い方覚えておきたい! zypper コマンドの使い方
覚えておきたい! zypper コマンドの使い方
 
不揮発メモリ(NVDIMM)とLinuxの対応動向について
不揮発メモリ(NVDIMM)とLinuxの対応動向について不揮発メモリ(NVDIMM)とLinuxの対応動向について
不揮発メモリ(NVDIMM)とLinuxの対応動向について
 
Process Address Space: The way to create virtual address (page table) of user...
Process Address Space: The way to create virtual address (page table) of user...Process Address Space: The way to create virtual address (page table) of user...
Process Address Space: The way to create virtual address (page table) of user...
 
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
 
Find your own iOS kernel bug
Find your own iOS kernel bugFind your own iOS kernel bug
Find your own iOS kernel bug
 
P4, EPBF, and Linux TC Offload
P4, EPBF, and Linux TC OffloadP4, EPBF, and Linux TC Offload
P4, EPBF, and Linux TC Offload
 
ALSS14: Xen Project Automotive Hypervisor (Demo)
ALSS14: Xen Project Automotive Hypervisor (Demo)ALSS14: Xen Project Automotive Hypervisor (Demo)
ALSS14: Xen Project Automotive Hypervisor (Demo)
 

Andere mochten auch

SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingBrent Muir
 
USB Powerpoint
USB PowerpointUSB Powerpoint
USB Powerpointaaron924
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5Brent Muir
 
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Philip Polstra
 
Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor SkochinskyCODE BLUE
 
Malware analysis
Malware analysisMalware analysis
Malware analysisxabean
 
How Google Glass Works
How Google Glass WorksHow Google Glass Works
How Google Glass WorksDeneyim Patent
 
Preventing hard disk firmware manipulation attack and disaster recovery by Da...
Preventing hard disk firmware manipulation attack and disaster recovery by Da...Preventing hard disk firmware manipulation attack and disaster recovery by Da...
Preventing hard disk firmware manipulation attack and disaster recovery by Da...CODE BLUE
 
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...CODE BLUE
 
USB 3.0 Product Info
USB 3.0 Product InfoUSB 3.0 Product Info
USB 3.0 Product Infoanntu0723
 
USB Training - Silicon Labs -
USB Training - Silicon Labs -USB Training - Silicon Labs -
USB Training - Silicon Labs -Emanuele Bonanni
 
Introduction to c#
Introduction to c#Introduction to c#
Introduction to c#singhadarsh
 
BadUSB, and what you should do about it
BadUSB, and what you should do about itBadUSB, and what you should do about it
BadUSB, and what you should do about itrobertfisk
 
Ordenes del cmd
Ordenes del cmdOrdenes del cmd
Ordenes del cmdmery1044
 
Sistemas operativos
Sistemas operativosSistemas operativos
Sistemas operativos2bticdalvisl
 
Couach 4400 Fast Fly - 44 metres
Couach 4400 Fast Fly - 44 metresCouach 4400 Fast Fly - 44 metres
Couach 4400 Fast Fly - 44 metresNicolas Claris
 

Andere mochten auch (20)

SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
 
USB Powerpoint
USB PowerpointUSB Powerpoint
USB Powerpoint
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5
 
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
 
Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor Skochinsky
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
How Google Glass Works
How Google Glass WorksHow Google Glass Works
How Google Glass Works
 
Preventing hard disk firmware manipulation attack and disaster recovery by Da...
Preventing hard disk firmware manipulation attack and disaster recovery by Da...Preventing hard disk firmware manipulation attack and disaster recovery by Da...
Preventing hard disk firmware manipulation attack and disaster recovery by Da...
 
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
 
Powe piont idioms
Powe piont idiomsPowe piont idioms
Powe piont idioms
 
USB 3.0 Product Info
USB 3.0 Product InfoUSB 3.0 Product Info
USB 3.0 Product Info
 
USB Training - Silicon Labs -
USB Training - Silicon Labs -USB Training - Silicon Labs -
USB Training - Silicon Labs -
 
Introduction to c#
Introduction to c#Introduction to c#
Introduction to c#
 
BadUSB, and what you should do about it
BadUSB, and what you should do about itBadUSB, and what you should do about it
BadUSB, and what you should do about it
 
BAD USB 2.0
BAD USB 2.0BAD USB 2.0
BAD USB 2.0
 
Ordenes del cmd
Ordenes del cmdOrdenes del cmd
Ordenes del cmd
 
Sistemas operativos
Sistemas operativosSistemas operativos
Sistemas operativos
 
Actividad 6.3
Actividad 6.3Actividad 6.3
Actividad 6.3
 
Ordenes del cmd
Ordenes del cmdOrdenes del cmd
Ordenes del cmd
 
Couach 4400 Fast Fly - 44 metres
Couach 4400 Fast Fly - 44 metresCouach 4400 Fast Fly - 44 metres
Couach 4400 Fast Fly - 44 metres
 

Ähnlich wie Controlling USB Flash Drive Controllers: Expose of Hidden Features

BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)Michael Smith
 
Building Trojan Hardware at Home
Building Trojan Hardware at HomeBuilding Trojan Hardware at Home
Building Trojan Hardware at HomeE Hacking
 
SuperSpeed USB and NAND Flash
SuperSpeed USB and NAND FlashSuperSpeed USB and NAND Flash
SuperSpeed USB and NAND FlashNaziaG
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pibagal7694
 
PiFlash: Linux utility to flash SD cards for Raspberry Pi computers
PiFlash: Linux utility to flash SD cards for Raspberry Pi computersPiFlash: Linux utility to flash SD cards for Raspberry Pi computers
PiFlash: Linux utility to flash SD cards for Raspberry Pi computersIan Kluft
 
Mickey threats inside your platform final
Mickey  threats inside your platform finalMickey  threats inside your platform final
Mickey threats inside your platform finalPacSecJP
 
Dragon board 410c workshop - slideshow
Dragon board 410c workshop - slideshowDragon board 410c workshop - slideshow
Dragon board 410c workshop - slideshow96Boards
 
Linux as a gaming platform, ideology aside
Linux as a gaming platform, ideology asideLinux as a gaming platform, ideology aside
Linux as a gaming platform, ideology asideLeszek Godlewski
 
2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UKmfoudi
 
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...Neil Armstrong
 
Hacking and Forensics on the Go - 44CON 2012
Hacking and Forensics on the Go - 44CON 2012Hacking and Forensics on the Go - 44CON 2012
Hacking and Forensics on the Go - 44CON 201244CON
 
Building android for the Cloud: Android as a Server (AnDevConBoston 2014)
Building android for the Cloud: Android as a Server (AnDevConBoston 2014)Building android for the Cloud: Android as a Server (AnDevConBoston 2014)
Building android for the Cloud: Android as a Server (AnDevConBoston 2014)Ron Munitz
 
Project ACRN USB mediator introduction
Project ACRN USB mediator introductionProject ACRN USB mediator introduction
Project ACRN USB mediator introductionProject ACRN
 
Алексей Мисник - USB устройства для пентеста
Алексей Мисник - USB устройства для пентестаАлексей Мисник - USB устройства для пентеста
Алексей Мисник - USB устройства для пентестаHackIT Ukraine
 
Vampire Mice: How USB PM Impacts You
Vampire Mice: How USB PM Impacts YouVampire Mice: How USB PM Impacts You
Vampire Mice: How USB PM Impacts YouSage Sharp
 

Ähnlich wie Controlling USB Flash Drive Controllers: Expose of Hidden Features (20)

Hardware hacking
Hardware hackingHardware hacking
Hardware hacking
 
Let's begin io t with $10
Let's begin io t with $10Let's begin io t with $10
Let's begin io t with $10
 
BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)BlackHat 2009 - Hacking Zigbee Chips (slides)
BlackHat 2009 - Hacking Zigbee Chips (slides)
 
Building Trojan Hardware at Home
Building Trojan Hardware at HomeBuilding Trojan Hardware at Home
Building Trojan Hardware at Home
 
SuperSpeed USB and NAND Flash
SuperSpeed USB and NAND FlashSuperSpeed USB and NAND Flash
SuperSpeed USB and NAND Flash
 
Beagle board101 esc-boston-2009b
Beagle board101 esc-boston-2009bBeagle board101 esc-boston-2009b
Beagle board101 esc-boston-2009b
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
PiFlash: Linux utility to flash SD cards for Raspberry Pi computers
PiFlash: Linux utility to flash SD cards for Raspberry Pi computersPiFlash: Linux utility to flash SD cards for Raspberry Pi computers
PiFlash: Linux utility to flash SD cards for Raspberry Pi computers
 
Mickey threats inside your platform final
Mickey  threats inside your platform finalMickey  threats inside your platform final
Mickey threats inside your platform final
 
Dragon board 410c workshop - slideshow
Dragon board 410c workshop - slideshowDragon board 410c workshop - slideshow
Dragon board 410c workshop - slideshow
 
Linux as a gaming platform, ideology aside
Linux as a gaming platform, ideology asideLinux as a gaming platform, ideology aside
Linux as a gaming platform, ideology aside
 
2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
 
Main notes (1)
Main notes (1)Main notes (1)
Main notes (1)
 
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...
 
Polstra 44con2012
Polstra 44con2012Polstra 44con2012
Polstra 44con2012
 
Hacking and Forensics on the Go - 44CON 2012
Hacking and Forensics on the Go - 44CON 2012Hacking and Forensics on the Go - 44CON 2012
Hacking and Forensics on the Go - 44CON 2012
 
Building android for the Cloud: Android as a Server (AnDevConBoston 2014)
Building android for the Cloud: Android as a Server (AnDevConBoston 2014)Building android for the Cloud: Android as a Server (AnDevConBoston 2014)
Building android for the Cloud: Android as a Server (AnDevConBoston 2014)
 
Project ACRN USB mediator introduction
Project ACRN USB mediator introductionProject ACRN USB mediator introduction
Project ACRN USB mediator introduction
 
Алексей Мисник - USB устройства для пентеста
Алексей Мисник - USB устройства для пентестаАлексей Мисник - USB устройства для пентеста
Алексей Мисник - USB устройства для пентеста
 
Vampire Mice: How USB PM Impacts You
Vampire Mice: How USB PM Impacts YouVampire Mice: How USB PM Impacts You
Vampire Mice: How USB PM Impacts You
 

Kürzlich hochgeladen

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Controlling USB Flash Drive Controllers: Expose of Hidden Features