CW+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
August 2016

BadUSB 2.0: Exploring USB man-in-the-middle attacks

Sponsored by ComputerWeekly.com

This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.

Table Of Contents

  • The evaluation tool, BadUSB2, was developed as a means to evaluate the compromise of USB fixed- line communications through an active man-in-the-middle (MITM) attack.
  • BadUSB and now BadUSB2 demonstrate a new breed of USB-based attacks that not only attempt to circumvent existing controls, but also allow an adversary to access the network with user privileges.
  • BadUSB2 can mimic the role of other hardware implants, such as hardware keyloggers, keyboard emulating devices or even BadUSB.