Digispark USB Attack Tool Workshop: Difference between revisions
m Creating a stub |
m Creating a stub |
||
Line 6: | Line 6: | ||
In this class, we’ll program a microcontroller in Arduino to create our own scripts that run when the device is plugged into a target computer. | In this class, we’ll program a microcontroller in Arduino to create our own scripts that run when the device is plugged into a target computer. | ||
Students will | Students will need a Digispark, which they can learn to program to compete in a CTF challenge. | ||
Revision as of 22:44, 24 July 2020
Program your own HID attack device with a Digispark!
Human Interface Device attacks like the USB rubber ducky are famous for being able to exploit a computer with only a few seconds of physical access by pretending to be a keyboard.
In this class, we’ll program a microcontroller in Arduino to create our own scripts that run when the device is plugged into a target computer.
Students will need a Digispark, which they can learn to program to compete in a CTF challenge.
Prerequisites:
Computer with Arduino IDE installed ( https://www.arduino.cc/en/main/software ) and a micro USB cable.
About our teacher:
Kody Kinzie is a security researcher at Varonis, with a background in Wi-Fi security and low-cost hacking tools. He hosts the Cyber Weapons Lab show on Null Byte's YouTube channel, a soon to be released show for Hak5, and the Varonis Security Tools podcast. Aside from Wi-Fi hacking, Kody also teaches about open-source intelligence, Python programming, and Arduino-based hacking tools.