Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. The book consists of seven chapters that cover the following: (i) USB Hacksaw; (ii) the USB Switchblade; (iii) viruses and malicious codes; (iv) USB-based heap overflow; (v) the evolution of forensics in computer security; (vi) pod slurping; and (vii) the human element of security, including the risks, rewards, and controversy surrounding social-engineering engagements. This book was written to target a vast audience including students, technical staff, business leaders, or anyone seeking to understand fully the removable-media risk for Windows systems. It provides the tools, tricks, and detailed instructions necessary to reconstruct and mitigate these activities while peering into the risks and future aspects surrounding the respective technologies. The attacks outlined in this book are intended for individuals with moderate Microsoft Windows proficiency.

Key Features

  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable


Information security professionals of all levels; web application developers; recreational hackers

Table of Contents

About the Authors Introduction Chapter 1 USB Hacksaw     Sharing Away Your Future     Anatomy of the Attack          Universal Serial Bus          U3 and Flash Drive CD-ROM Emulation          Inside the Hacksaw Attack          Hacksaw Removal     What Is the Big Deal?          Regulators, Mount Up     Evolution of the Portable Platform          Portable Platforms          Hacksaw Development     Defending against This Attack     Summary     Endnotes Chapter 2 USB Switchblade     Passing Grades     Inside the Switchblade          Switchblade Tool Summaries          Switchblade Assembly     Why Should I Care?     Evolving Aspects          Privilege Elevation     Defensive Techniques          System Execution Prevention and USB Antidote          Biometrics and Token Security          Password Protection Practices          Windows Group Policy Options          Browser Settings and Screen Savers     Summary Chapter 3 USB-Based Virus/Malicious Code Launch     Invasive Species among Us          An Uncomfortable Presentation     Anatomy of the Attack          Malicious Code Methodologies          Autorun          How to Recreate the Attack     Evolution of the Attack     Why All the Fuss?          Botnets          Distributed Denial-of-Service Attacks          E-mail Spamming          Infecting New Hosts          Identity Theft          Transporting Illegal Software          Google AdSense and Advertisement Add-On Abuse     Defending against This Attack          Antimalware     Summary     Endnotes Chapter 4 USB Device Overflow     Overflow Overview     Analyzing This Attack          Device Drivers          Going with the Overflow          USB Development and the Hole in the Heap     Ever-Present Exposures     Overflow Outlook     Defensive Strategies          Drivers          Physical Protection Mechanisms     Summary     Endnote Chapter 5 RAM dump     Gadgets Gone Astray     Digital Forensic Acquisition Ex


No. of pages:
© 2010
Print ISBN:
Electronic ISBN:


"Seven Deadliest USB Attacks provides real-world insight into issues a good deal of computer users don't even realize exist. The author's clear voice profiles attack scenarios, tools, as well as mitigation techniques. This book raises the right questions and provides the right answers" - Mirko Zorz, Editor in Chief of Help Net Security and (IN)SECURE Magazine