This document discusses security topics like the Certified Ethical Hacker (CEH) certification and the NSA Information Assurance Methodology. It also discusses USB-based microcontroller development systems and programmable USB keyboards that can be used for keystroke injection. The document provides code examples for using a Teensy device and Arduino software to program a keyboard for tasks like opening websites and entering URLs. It warns about limitations of this approach and recommends hand-coding instead of using automated tools. Contact information is provided at the end.
1 of 21
More Related Content
Teensy Preso
2. |EH (Certified Ethical Hacker)
NSA-IAMIEM (NSA Information Assurance Methodology)
Other Security Related Stuff:
Contributor: The Ethical Hacker. Net
Contributor:Hakin9 Magazine
Contributor: Penetration Testing Execution Standard
Information Security Mentors Project (Mentor)
3. David Crenshaw Irongeek
Darren Kitchen Hak5
Robin Wood
David Kennedy (ReLik) SET Toolkit
http://www.irongeek.com/i.php?page=security/programmable-hid-usb-keystroke-
dongle
4. USB-based microcontroller development system
AVR Processor, 16 MHz
Single push button programming
Small Size
Works with Mac OS X, Linux & Windows
Flash Memory 32256
5. USB-based microcontroller development system
AVR Processor, 20 MHz
Single push button programming
Small Size
Works with Mac OS X, Linux & Windows
Flash Memory 130048
6. Allows for keystroke programming
Not dependent on U3 auto run
Can provide you a shell and kill antivirus faster than you can!
Cheap Economy is bad and you need to spend less! ($16 $24)
Easily Implantable (More on This Later)
7. Teensy Device
Teensy Loader Software
Arduino Software
Teensy Duino Software
Serial Install
Mini B USB Cable
Computer
Your Brain and some good ideas
8. Can be programmed in C or Arduino Language
http://www.pjrc.com/teensy
9. Limited Scope
Limited Attack Vectors
You only get 5 hardened IP addresses
Be Finished by Tomorrow!!!!
Laughing CISOs What you not in yet?
18. Target needs to be logged in!
Limited to the access rights of the logged on user!
Lots of things can and sometimes do go wrong!
If you try to drop shell right away you will be caught