Access your Pro+ Content below.
BadUSB 2.0: Exploring USB man-in-the-middle attacks
Sponsored by ComputerWeekly.com
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Table Of Contents
- The evaluation tool, BadUSB2, was developed as a means to evaluate the compromise of USB fixed- line communications through an active man-in-the-middle (MITM) attack.
- BadUSB and now BadUSB2 demonstrate a new breed of USB-based attacks that not only attempt to circumvent existing controls, but also allow an adversary to access the network with user privileges.
- BadUSB2 can mimic the role of other hardware implants, such as hardware keyloggers, keyboard emulating devices or even BadUSB.
Access this CW+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.