Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - You want the Geek? You can't handle the Geek!

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. Smart Defrag
2. GS Auto Clicker
3. Macrium Reflect FREE Edition
4. Sergei Strelec's WinPE
5. MusicBee
6. Visual C++ Redistributable Runtimes AIO Repack
7. K-Lite Mega Codec Pack
8. ImgBurn
9. Unlocker
10. Format Factory
More >>

top reads

Star 8 Windows Shortcuts That’ll Make You More Productive and Save You Time

Star Windows 10 Not Dead Yet - You Can Still Get Updates For Free

Star What is a '400 Bad Request - Request Header or Cookie Too Large' Error and How to Fix It

Star How to Fix Windows Install Error 0xC1900101

Star How to Force Enable Windows 10 Extended Security Updates If The Option Is Not Showing

Star Windows 11 25H2 is Out: What’s New and How to Get It Now.

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star Boost Your PC Speed with ReadyBoost: How a Thumb Drive Can Enhance Your System's Performance

Star 5 Hidden Windows Tools You’ve Had All Along But Never Use

Star Use the Windows 10 Media Creation Tool Before Support Ends For Windows 10 in 2025


MajorGeeks.Com » News » December 2012 » When USB memory sticks lie

When USB memory sticks lie


Contributed by: Email on 12/31/2012 04:29 PM [ comments Comments ]


USB memory sticks are thought to be among the less exciting hardware components – simple storage media that have many uses and function the same way in almost any hardware environment. That this isn't actually true was demonstrated by Pwnie-winning hacker Travis Goodspeed at the 29th Chaos Communication Congress (29C3) in Hamburg.

"We think of USB memory sticks as block devices, but in reality they are computers that use a network to talk to a host", said Goodspeed. "These devices can send any data they want." Once this perspective is adopted, whole new fields of application become possible, explained the researcher. For example, Goodspeed noted that USB device drivers are often poorly programmed and offer many access points, and that it is possible to modify files while a USB memory stick is connected.

Security researcher Collin Mulliner exploited the misplaced trust in these USB devices to install an unauthorized extension on a Samsung smart TV that allowed him to gain full access to the TV's systemPDF because the TV initially checks for authorized extensions on the USB memory stick. For the check, Mulliner presented the TV with an allegedly authorized plug-in. However, during the actual installation process, the researcher planted a totally different file in the system and used it to obtain telnet access. This allowed him to make arbitrary firmware changes, for instance in order to record content from a premium TV channel.

Apparently, this hack is only the beginning. Goodspeed has developed a board called Facedancer11 that can emulate arbitrary USB devices. "This is a development tool", emphasized the researcher. Goodspeed explained that it is, for example, possible to pretend that a smartphone has established a connection to the computer in order to initiate a firmware update. According to the researcher, the data that can be intercepted this way enables potential attackers to find out how exactly the update process works and allows them to save a firmware image for further analysis. Using the board to examine a computer's communications, an attacker can then build USB devices that target specific vulnerabilities in the host computer.

However, emulating a USB memory stick opens up other new possibilities. Through fingerprinting, the USB memory stick can quickly establish what kind of device is trying to communicate with it. For example, Windows PCs access the USB memory stick's MBR a total of nine times, while Linux distributions can be differentiated by their automounters. USB memory sticks can register such behavioral patterns and use them to return the data that the owner wishes to disclose. "When the MBR is read nine times, it's probably not my laptop", said Goodspeed. With the necessary programming, a USB memory stick can, therefore, return different content to a Windows PC than it does to a Linux computer.

Goodspeed says that he can also analyze the accessing user's intention. For example, the researcher explained that, when detecting a USB memory stick, Windows PCs write the access date to the storage device by default. However, if a PC neglects to do this, it is likely that the user is trying to duplicate the USB stick for forensic purposes – leaving a storage device unmodified is one of the top priorities when collecting evidence. Goodspeed said that he can program his USB memory stick in such a way that it will self-destruct when someone tries to create a copy for forensic purposes. "As long as a forensics expert doesn't know that he's dealing with a special USB memory stick, you've won", said the researcher.






« Critical zero-day hole in Internet Explorer - Update · When USB memory sticks lie · Man arrested for trailer theft after owner sees theft from his plane »




Comments
comments powered by Disqus

MajorGeeks.Com » News » December 2012 » When USB memory sticks lie

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition