Click or hover over image to zoom in

BadUSB

80.00 CNY tax
291 in stock
Introduction to the
The hardware is directly inserted into the computer of the other party, so that the computer of the other party can execute the code, so as to interfere with, control the host or steal information.
threat
The BadUSB threat is that malicious code exists in the firmware of the USB drive, and the antivirus software on the PC cannot access the firmware area of the USB drive, which means that both antivirus software and usb drive formatting cannot deal with BadUSB attacks.
The principle of
Hardware Knowledge Base
HID attack
HID is the abbreviation of Human Interface Device. From its name, we can know that HID Device is a Device that directly interacts with people, such as keyboard, mouse and joystick. However, HID devices do not necessarily have man-machine interface, as long as the HID category specifications are HID devices. Generally speaking, HID attacks mainly focus on the keyboard and mouse, because as long as the control of the user keyboard, basically equal to the control of the user's computer. The attacker hides the attack in a normal mouse keypad, and when the user inserts a mouse or keyboard containing the attack vector into the computer, the malicious code is loaded and executed.
Teensy
When the attacker customizes the attack device, he will put an attack chip into the USB device. This attack chip is a very small and complete microcontroller development system named TEENSY. Through the TEENSY you can simulate a keyboard and mouse, when you insert the custom USB device, the computer will recognize as a keyboard, using microprocessor and storage of equipment and programming in attack code, can send control commands to the host, host, is completely controlled by whether playing automatically open, can be successful.
Arduino
Arduino is a convenient and flexible open source electronic prototype platform. It is built on open source Simple
I/O interface edition with Processing/Wiring development environment using Java, C language like. It mainly consists of two main parts: the hardware part is the Arduino circuit board which can be used for circuit connection; The other is the Arduino IDE, the program development environment on your computer. You just write code in the IDE, upload it to the Arduino, and it tells the Arduino what to do.
Attack process
After the bad-USB is inserted, it will simulate the operation of the keyboard and mouse on the computer. Through these operations, the command terminal of the computer will be opened and a command will be executed, which will download other codes from the specified website and run silently in the background. These code functions include stealing information, bouncing shell, sending emails, etc., so as to achieve the purpose of controlling the target computer or stealing information.
Production tools
hardware
Usb flash drive with 1286 chip or 2303 chip

Chinese hacker forum customized BadUSB picture display
 

 
 

 Share

About BadUSB

 

 

Introduction to the
The hardware is directly inserted into the computer of the other party, so that the computer of the other party can execute the code, so as to interfere with, control the host or steal information.

threat
The BadUSB threat is that malicious code exists in the firmware of the USB drive, and the antivirus software on the PC cannot access the firmware area of the USB drive, which means that both antivirus software and usb drive formatting cannot deal with BadUSB attacks.

The principle of
Hardware Knowledge Base
HID attack
HID is the abbreviation of Human Interface Device. From its name, we can know that HID Device is a Device that directly interacts with people, such as keyboard, mouse and joystick. However, HID devices do not necessarily have man-machine interface, as long as the HID category specifications are HID devices. Generally speaking, HID attacks mainly focus on the keyboard and mouse, because as long as the control of the user keyboard, basically equal to the control of the user's computer. The attacker hides the attack in a normal mouse keypad, and when the user inserts a mouse or keyboard containing the attack vector into the computer, the malicious code is loaded and executed.

Teensy
When the attacker customizes the attack device, he will put an attack chip into the USB device. This attack chip is a very small and complete microcontroller development system named TEENSY. Through the TEENSY you can simulate a keyboard and mouse, when you insert the custom USB device, the computer will recognize as a keyboard, using microprocessor and storage of equipment and programming in attack code, can send control commands to the host, host, is completely controlled by whether playing automatically open, can be successful.

Arduino
Arduino is a convenient and flexible open source electronic prototype platform. It is built on open source Simple
I/O interface edition with Processing/Wiring development environment using Java, C language like. It mainly consists of two main parts: the hardware part is the Arduino circuit board which can be used for circuit connection; The other is the Arduino IDE, the program development environment on your computer. You just write code in the IDE, upload it to the Arduino, and it tells the Arduino what to do.

Attack process
After the bad-USB is inserted, it will simulate the operation of the keyboard and mouse on the computer. Through these operations, the command terminal of the computer will be opened and a command will be executed, which will download other codes from the specified website and run silently in the background. These code functions include stealing information, bouncing shell, sending emails, etc., so as to achieve the purpose of controlling the target computer or stealing information.

Production tools
hardware
Usb flash drive with 1286 chip or 2303 chip


Chinese hacker forum customized BadUSB picture display

 

QQ图片20200422230028.jpgQQ图片20200422230045.jpg

 

 

Shipping Options

Shipping options and prices may vary depending on the total value of your order. Your final shipping price will be determined at checkout.

  • 20.00 CNY - 出货费率 (3天)

Shipping Size

  • Size
    1.97 in × 0 in × 0 in
  • Weight
    0 lb