Achieving Linux Kernel Code Execution Through a Malicious USB Device

Achieving Linux Kernel Code Execution Through a Malicious USB Device

Black Hat via YouTube Direct link

Intro

1 of 19

1 of 19

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Achieving Linux Kernel Code Execution Through a Malicious USB Device

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why USB based attacks?
  3. 3 CVE-2016-2384: what is it about?
  4. 4 USB probing process
  5. 5 CVE-2016-2384: what happens with the heap?
  6. 6 The midi object
  7. 7 Exploitation primitive
  8. 8 USB HID Probing
  9. 9 Development environment: QEMU
  10. 10 Payload delivery method
  11. 11 Where to hijack the code?
  12. 12 Payload design
  13. 13 Exploit payload
  14. 14 Run shell commands
  15. 15 Attack challenges
  16. 16 Exploit mitigations
  17. 17 Applicability
  18. 18 Exploitation Requirements
  19. 19 Takeaways

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.