{"id":819,"date":"2014-12-21T21:45:07","date_gmt":"2014-12-22T02:45:07","guid":{"rendered":"http:\/\/adsecurity.org\/?p=819"},"modified":"2014-12-21T21:45:07","modified_gmt":"2014-12-22T02:45:07","slug":"badusb-exploit-usbdriveby","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=819","title":{"rendered":"BadUSB Exploit: USBDriveBy"},"content":{"rendered":"<p>Samy posted a <a href=\"http:\/\/samy.pl\/usbdriveby\/\">simple Mac OSX exploit<\/a> leveraging the <a title=\"BadUSB Overview (Presentation &amp; Slides) &amp; Recent Release of BadUSB Exploit Code\" href=\"https:\/\/adsecurity.org\/?p=362\">BadUSB vulnerability<\/a>.<\/p>\n<blockquote><p><strong>USBdriveby<\/strong> is a device you stylishly wear around your neck which can quickly and covertly install a backdoor and override DNS settings on an unlocked machine via USB in a matter of seconds. It does this by emulating a keyboard and mouse, blindly typing controlled commands, flailing the mouse pointer around and weaponizing mouse clicks.<\/p>\n<p>In this project, we&#8217;ll learn how to exploit a system&#8217;s blind trust in USB devices, and learn how a $20 Teensy microcontroller can evade various security settings on a real system, open a permanent backdoor, disable a firewall, control the flow of network traffic, and all within a few seconds and permanently, even after the device has been removed.<\/p><\/blockquote>\n<p><a href=\"http:\/\/samy.pl\/usbdriveby\/\">Read the rest here.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Samy posted a simple Mac OSX exploit leveraging the BadUSB vulnerability. USBdriveby is a device you stylishly wear around your neck which can quickly and covertly install a backdoor and override DNS settings on an unlocked machine via USB in a matter of seconds. It does this by emulating a keyboard and mouse, blindly typing &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=819\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[347,168],"tags":[349,352,350,351],"class_list":["post-819","post","type-post","status-publish","format-standard","hentry","category-exploit","category-hardware-security","tag-badusbexploit","tag-macosx","tag-usbdriveby","tag-usbvulnerability","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=819"}],"version-history":[{"count":1,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/819\/revisions"}],"predecessor-version":[{"id":820,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/819\/revisions\/820"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}