Seven Deadliest USB AttacksBy
- Brian Anderson, An avid security researcher with expertise in reverse engineering focusing on vulnerabilities and exploits and advising clients on proper remediation.
- Barbara Anderson, CCSP, CISSP, CCNP, CCDP
Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Attacks detailed in this book include:
- USB Hacksaw
- USB Switchblade
- USB Based Virus/Malicous Code Launch
- USB Device Overflow
- Pod Slurping
- Social Engineering and USB Technology
Paperback, 256 Pages
Published: April 2010
Chapter 1: USB Hacksaw
Chapter 2: USB SwitchbladeChapter 3: USB Based Virus / Malicious Code LaunchChapter 4: USB Device OverFlowChapter 5: USB Ramdump Chapter 6: Podslurping-A USB ProblemChapter 7: Social Engineering and USB Come Together for a Brutal Attack