![]() ![]() Phil has published several articles on USB-related topics. He is also known for his work on USB hacking and forensics. ![]() His work on developing small affordable hacking devices is documented in the book “Hacking and Penetration Testing with Low Power Devices”. Here are just a few of the conferences he has spoken at: DEFCON (six times in four years), Blackhat, 44CON, GrrCON, BruCon, ForenSecure, SecTOR, c0c0n, Shakacon, B-sides Detroit, and B-sides Iowa. He has made repeat appearances at several of the top conferences worldwide. Phil is an internationally recognized hardware hacker and information security expert. He has been tinkering with computers and electronics ever since. He and one of his brothers cleaned out their savings to purchase a TI-99/4a computer in the early 80’s, much to the chagrin of his parents. Phil) has been involved with technology since an early age. Mitigation of BadUSB and similar threatsĭr.Along the way students will also learn how to use microcontrollers and Udev rules.Ī non-exhaustive list of topics includes: This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to sniff USB traffic using open source tools, be able to write-block USB mass storage devices using software and microcontroller-based hardware, be able to impersonate other USB devices, and understand how to make forensic duplicates of USB mass storage devices. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |