Seven Deadliest USB Attacks Review …..

January 15, 2016

seven deadliest usb attacks








Seven Deadliest USB Attacks Review…..

The Universal Serial Bus (USB) Hacksaw was devised by a posse of self-proclaimed “IT-Ninjas” acting on behalf of the Hak.5 organization. The Hacksaw is one mutation of many USB-related hacks that have been released on this site.

The U3 smart drive was co-developed by SanDisk and M-Systems in 2005. U3 smart drives are USB flash drives with a unique hardware and software setup. The flash-drive hardware configuration causes Windows disk management to provide dual partitions. An emulated read-only CD drive partition contains the autorun.inf and LaunchPad software. The additional drive is a standard file allocation table (FAT) partition , which includes a hidden “SYSTEM” folder for installed application. This configuration allows a U3 flash drive to launch automatically when inserted into a computer.

The regulation of the U3 platform did not stop the hacking community from targeting it. Instead , they utilize a modified U3 LaunchPad called the Universal Customizer , which can overwrite the existing U3 software , enabling an open-source platform for global development with minimal governance. Many administrative and forensic-type applications are finding their way onto this and other open-source versions.

The USB Hacksaw tool is designed to work with Windows 2000 , XP . or 2003 systems only . although some success has been achieved on Vista. The program will manually install onto Windows 7 although Stunnel v4.11 is not compatible , resulting in a failure to establish a connection to the e-mail server. A Windows XP operating system was used to build the Hacksaw version outlined in the next section. In order to get the programs on the U3 drive , you must replace the launcher with the open-source code. The tool is designed to run automatically if autorun has not been disable by the user policy.

An antivirus (AV) kill script was initially released for the original verion of the USB Switchblade. It has since been taken down from the site due to mounting inconsistencies and failure caused by vendor updates and adaptations. Some AV vendors have already tagged the AV kill program released on the Hak.5 web site (csrss.exe) for the USB Switchblade as a virus , rendering it ineffective from the get-go. Since administrator access is required for Switchblade to run successfully , there are other techniques that can be used to disable AV before the payload execution.

p/s: – Some of the excerpt are taken from the book – Seven Deadliest USB Attacks – written by Brian Anderson and Barbara Anderson – publish by Syngress.

  • Just finish interview with iContro Software Sdn Bhd – Position : Software Developer at Kota Damansara  this week….





  1. In fact, the inventors of blue LED bulbs awarded with a noble peace prize for savung environment in a different way.

    The hardware you will have tto obtain is called CCcam Dreambox and it is powered by some instance of Linux operating
    system. Join our cardsharing service right not saving your money and time and enjoying the paid channels you care for the perfect.

  2. What’s up colleagues, its great paragraph on the topic of educationand fully explained,
    keep it up all the time.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: