Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks.
The book consists of seven chapters that cover the following: (i) USB Hacksaw; (ii) the USB Switchblade; (iii) viruses and malicious codes; (iv) USB-based heap overflow; (v) the evolution of forensics in computer security; (vi) pod slurping; and (vii) the human element of security, including the risks, rewards, and controversy surrounding social-engineering engagements.
This book was written to target a vast audience including students, technical staff, business leaders, or anyone seeking to understand fully the removable-media risk for Windows systems. It provides the tools, tricks, and detailed instructions necessary to reconstruct and mitigate these activities while peering into the risks and future aspects surrounding the respective technologies. The attacks outlined in this book are intended for individuals with moderate Microsoft Windows proficiency.
- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
Information security professionals of all levels; web application developers; recreational hackers
About the Authors Introduction Chapter 1 USB Hacksaw Sharing Away Your Future Anatomy of the Attack Universal Serial Bus U3 and Flash Drive CD-ROM Emulation Inside the Hacksaw Attack Hacksaw Removal What Is the Big Deal? Regulators, Mount Up Evolution of the Portable Platform Portable Platforms Hacksaw Development Defending against This Attack Summary Endnotes Chapter 2 USB Switchblade Passing Grades Inside the Switchblade Switchblade Tool Summaries Switchblade Assembly Why Should I Care? Evolving Aspects Privilege Elevation Defensive Techniques System Execution Prevention and USB Antidote Biometrics and Token Security Password Protection Practices Windows Group Policy Options Browser Settings and Screen Savers Summary Chapter 3 USB-Based Virus/Malicious Code Launch Invasive Species among Us An Uncomfortable Presentation Anatomy of the Attack Malicious Code Methodologies Autorun How to Recreate the Attack Evolution of the Attack Why All the Fuss? Botnets Distributed Denial-of-Service Attacks E-mail Spamming Infecting New Hosts Identity Theft Transporting Illegal Software Google AdSense and Advertisement Add-On Abuse Defending against This Attack Antimalware Summary Endnotes Chapter 4 USB Device Overflow Overflow Overview Analyzing This Attack Device Drivers Going with the Overflow USB Development and the Hole in the Heap Ever-Present Exposures Overflow Outlook Defensive Strategies Drivers Physical Protection Mechanisms Summary Endnote Chapter 5 RAM dump Gadgets Gone Astray Digital Forensic Acquisition Ex
- No. of pages:
- © Syngress 2010
- 22nd April 2010
- eBook ISBN:
- Paperback ISBN:
"Seven Deadliest USB Attacks provides real-world insight into issues a good deal of computer users don't even realize exist. The author's clear voice profiles attack scenarios, tools, as well as mitigation techniques. This book raises the right questions and provides the right answers" - Mirko Zorz, Editor in Chief of Help Net Security and (IN)SECURE Magazine