USB Communication Protocol
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Defending Against Malicious Peripherals with Cinch Sebastian Angel, the University of Texas at Austin and New York University; Riad S
Defending against Malicious Peripherals with Cinch Sebastian Angel, The University of Texas at Austin and New York University; Riad S. Wahby, Stanford University; Max Howald, The Cooper Union and New York University; Joshua B. Leners, Two Sigma; Michael Spilo and Zhen Sun, New York University; Andrew J. Blumberg, The University of Texas at Austin; Michael Walfish, New York University https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/angel This paper is included in the Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX ISBN 978-1-931971-32-4 Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX Defending against malicious peripherals with Cinch ⋆ Sebastian Angel, † Riad S. Wahby,‡ Max Howald,§† Joshua B. Leners,∥ ⋆ Michael Spilo,† Zhen Sun,† Andrew J. Blumberg, and Michael Walfish† ⋆ The University of Texas at Austin †New York University ‡Stanford University §The Cooper Union ∥Two Sigma Abstract Rushby’s separation kernel [129] (see also its modern de- scendants [81, 122]), the operating system is architected Malicious peripherals designed to attack their host com- to make different resources of the computer interact with puters are a growing problem. Inexpensive and powerful each other as if they were members of a distributed sys- peripherals that attach to plug-and-play buses have made tem. More generally, the rich literature on high-assurance such attacks easy to mount. Making matters worse, com- kernels offers isolation, confinement, access control, and modity operating systems lack coherent defenses, and many other relevant ideas. On the other hand, applying users are often unaware of the scope of the problem. -
Writing Your Own Gadget
02 November 2018 Writing Your Own Gadget Andrei Emeltchenko Contents ▪ Introduction ▪ General USB ▪ Using Ethernet over USB ▪ Using 802.15.4 over USB ▪ Other USB usages ▪ Experimental USB features: WebUSB ▪ Debugging without the board ▪ Summary ▪ References 2 Introduction: Problem ▪ Devices around (sensors, switches, etc) ▪ Problem connecting to devices with non standard PC interfaces ○ SPI, I2C, etc Access Complex Hardware 3 Introduction: Solution ▪ Use embedded board with special interfaces powered by Zephyr OS ▪ Zephyr board connects to Host via USB Zephyr gadget Interface USB Complex Hardware 4 Introduction: Zephyr ▪ Open Source RTOS for connected resource constrained devices https://www.zephyrproject.org/what-is-zephyr/ ▪ Hosted by Linux Foundation ▪ Supported more then 100 boards: https://docs.zephyrproject.org/latest/boards/boards.html ▪ Zephyr Project Documentation https://docs.zephyrproject.org/latest/index.html ▪ License: Apache 2.0 ▪ Source: https://github.com/zephyrproject-rtos/zephyr 5 Hello world in Zephyr ▪ Set up a development system https://docs.zephyrproject.org/latest/getting_started/getting_started.html#set-up-a-development-system ▪ Set up build environment $ source zephyr-env.sh ▪ Build hello_world sample for Qemu ▪ Run hello_world in Qemu $ cd samples/hello_world/ $ make run $ mkdir build $ cd build To exit from QEMU enter: 'CTRL+a, x' # Use cmake to configure a Make-based build [QEMU] CPU: qemu32,+nx,+pae $ cmake -DBOARD=qemu_x86 .. # Now run make on the generated build system: ***** Booting Zephyr OS zephyr-v1.13.0 ***** $ make Hello World! qemu_x86 6 USB: General overview ▪ One Host connected to many devices Device Descriptor ▪ Device identifies itself through Descriptors Endpoint Descriptor 1 ▪ Descriptors are binary data ... describing USB capabilities Endpoint Descriptor N ○ Device Class Interface Descriptor 1 ○ Product ID / Vendor ID .. -
The Hardware End, the Nanopi R1 Packs an Allwinner H3 Soc with a Quad-Core Arm Cortex-A7, up to 1Gb of DDR3 RAM, and Optional 8Gb of Emmc
The , HACKer s HARDWARE TOOLKit 2nd Edition 175 GADGETS 8 CATEGORIES Yago Hansen The HACKer,s HARDWARE TOOLKit 177 GADGETS 8 CATEGORIES Yago Hansen Copyright: Copyright © 2019 Yago Hansen. All rights reserved. Profile: linkedin.com/in/radiusdoc Title: Subtitle: Best gadgets for Red Team hackers E-book download link: https://github.com/yadox666/The-Hackers-Hardware-Toolkit Edition: 2nd English edition August, 2019 Level: Medium Paperback format: 182 pages Paperback editor: Amazon KDP Paperback Paperback ISBN: 9781099209468 Language: English Design: Claudia Hui License: Free for e-book distribution, but not for commercial use Mini computers Boards, palmtops RF SDR, cars, garages, satellite, GSM, LTE Wi-Fi Wi-Fi cards, antennas RFID & NFC Physical access, cards, magnetic stripe, cars HID & Keylog Rubberducky, mouse injection, wireless keyboards Network Routers, modems, VLAN, NAC BUS HW hacking, JTAG, cars, motorbikes Accessories Storage, powerbanks, batteries, chargers, GPS DISCLAIMMER If you like any of the devices shown here DO NOT HESITATE to take a picture of the related page! OCR codes shown here are not malicious! Prices shown here are only estimated Feel free to choose your PREFERRED shop Mini computers Boards, palmtops GPD micro PC 6-inch Handheld Industry Laptop Small handheld computer, ideal for carrying the best hacking software tools, and to handle all the external hardware hacking tools. The previous release supported Kali Linux. This version will probably support it too, since it supports Ubuntu Mate. Specifications Screen -
USB - an Attack Surface of Emerging Importance
Hamburg University of Technology Bachelor Thesis USB - An Attack Surface of Emerging Importance Examiner: Author: Prof. Dr. Dieter Gollmann Frieder Steinmetz Supervisor: Roland Schilling A thesis submitted in fulfilment of the requirements for the degree of Bachelor of Science at Security in Distributed Aplications March 3, 2015 Declaration of Authorship I, Frieder Steinmetz, declare that this thesis titled, 'USB - An Attack Surface of Emerging Importance' and the work presented in it are my own. I confirm that: This work was done wholly or mainly while in candidature for a research degree at this University. Where any part of this thesis has previously been submitted for a degree or any other quali- fication at this University or any other institution, this has been clearly stated. Where I have consulted the published work of others, this is always clearly attributed. Where I have quoted from the work of others, the source is always given. With the exception of such quotations, this thesis is entirely my own work. I have acknowledged all main sources of help. Where the thesis is based on work done by myself jointly with others, I have made clear exactly what was done by others and what I have contributed myself. Signed: Date: i \Security will not get better until tools for practical exploration of the attack surface are made available." \Wright's law" by Joshua Wright \We do what we must because we can." GLaDOS HAMBURG UNIVERSITY OF TECHNOLOGY Abstract Security in Distributed Aplications Bachelor of Science USB - An Attack Surface of Emerging Importance by Frieder Steinmetz USB is one of the most widely adopted standards for buses. -
The Hacker`S Hardware Toolkit 2Nd Edition
The Hacker`s Hardware Toolkit 2nd edition THE BEST COLLECTION OF HARDWARE GADGETS FOR RED TEAM HACKERS, PENTESTERS AND SECURITY RESEARCHERS YAGO HANSEN This catalog includes more than one hundred tools classified in eight different categories, to make it easier to search and to browse them. Disclaimer: This is NOT a commercial catalog, even if it looks like that. I have no personal interest in selling any of the shown tools. I just want to share many of the tools which I have used for different hacking purposes. Any tool not available to be bought online, will be excluded from the catalog. All the tools show an approximate price and an online shop where you can buy it, since feel free to check for other better or cheaper shops in Internet. All the OCR codes include the link to an online shop which ships to Europe and of course are not malicious. Download the catalog in PDF format for free in my Github account: https://github.com/yadox666/The-Hackers-Hardware-Toolkit Warning ! This catalog can cause serious problems at home with your couple. Do not abuse it! Take some minutes before clicking on the "Buy Now" button! Ethical hacker, expert in network engineering and system administration, with extensive experience in network infrastructures of all sizes, carrying out international projects for large corporations in the banking, insurance, telecom and Government security sectors among others. In recent decades he has specialized extensively in wireless technologies, successfully leading numerous projects for security planning, implementation and auditing. With his company (WiFense), he has developed an interception system for one of the largest global intelligence corporations based in Israel.