in ,

How a USB can Hack Your Computer ?

How Hackers can Use USB to Hack your Computer?

 How Hackers can Hack your Computer With a little USB

kali linux tutorials hacking

Hi every one today on K4linux, we will share with you a video conference that explain:

How Hackers can use USB to take control and Hack your Computer, this video conference was made by Karsten Nohl and Jakob Lell on Black Hat USA ” BadUSB – On Accessories that Turn Evil “.

If you plug this little USB drive into your computer, you won’t have time to do anything to avoid your fate. It’s too late. Your computer is fried.

Normally, the last thing a hacker wants to do is destroy your computer. There’s too much lucrative private data stored inside. Viruses that actively damage or destroy computer hardware are few and far between.

USB has become so commonplace that we rarely worry about its security implications. USB sticks undergo the occasional virus scan, but we consider USB to be otherwise perfectly safe – until now.

This talk introduces a new form of malware that operates from controller chips inside USB devices. USB sticks, as an example, can be reprogrammed to spoof various other device types in order to take control of a computer, exfiltrate data, or spy on the user.

We demonstrate a full system compromise from USB and a self-replicating USB virus not detectable with current defenses.

We then dive into the USB stack and assess where protection from USB malware can and should be anchored.


If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

With Love and Prosperity K4LINUX-TEAM.


What do you think?

1075 points
Upvote Downvote

Total votes: 7

Upvotes: 2

Upvotes percentage: 28.571429%

Downvotes: 5

Downvotes percentage: 71.428571%

Leave a Reply

Your email address will not be published. Required fields are marked *

kali linux lazykali hackpack install

Kali Linux Tutorials – Install Lazykali and Hackpack

How to fix repositories kali linux

Kali Linux Tutorials – Sources.list Fix Repositories