Seven deadliest USB attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure....

Descripción completa

Detalles Bibliográficos
Autor principal: Anderson, Brian (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Syngress c2010.
Edición:1st edition
Colección:Syngress seven deadliest attacks series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627809806719
Tabla de Contenidos:
  • Front Cover; Half Title Page; Series Title Page; Title Page; Copyright Page; Table of Contents; About the Authors; Introduction; Chapter 1. USB Hacksaw; Sharing Away Your Future; Anatomy of the Attack; Universal Serial Bus; U3 and Flash Drive CD-ROM Emulation; Inside the Hacksaw Attack; Hacksaw Removal; What Is the Big Deal?; Regulators, Mount Up; Evolution of the Portable Platform; Portable Platforms; Hacksaw Development; Defending against This Attack; Summary; Endnotes; Chapter 2. USB Switchblade; Passing Grades; Inside the Switchblade; Switchblade Tool Summaries; Switchblade Assembly
  • Why Should I Care?Evolving Aspects; Privilege Elevation; Defensive Techniques; System Execution Prevention and USB Antidote; Biometrics and Token Security; Password Protection Practices; Windows Group Policy Options; Browser Settings and Screen Savers; Summary; Chapter 3. USB-Based Virus/Malicious Code Launch; Invasive Species among Us; An Uncomfortable Presentation; Anatomy of the Attack; Malicious Code Methodologies; Autorun; How to Recreate the Attack; Evolution of the Attack; Why All the Fuss?; Botnets; Distributed Denial-of-Service Attacks; E-mail Spamming; Infecting New Hosts
  • Identity TheftTransporting Illegal Software; Google AdSense and Advertisement Add-On Abuse; Defending against This Attack; Antimalware; Summary; Endnotes; Chapter 4. USB Device Overflow; Overflow Overview; Analyzing This Attack; Device Drivers; Going with the Overflow; USB Development and the Hole in the Heap; Ever-Present Exposures; Overflow Outlook; Defensive Strategies; Drivers; Physical Protection Mechanisms; Summary; Endnote; Chapter 5. RAM dump; Gadgets Gone Astray; Digital Forensic Acquisition Examination
  • Computer Online Forensic Evidence Extractor or Detect and Eliminate Computer-Assisted Forensics?Memory Gatherings; Reconstructing the Attack; Mind Your Memory; Advancements in Memory Analysis; ManTech DD; Additional Analysis Tools; Future Memories; The Room with an Evil View; Hindering the Gatherers; Security Framework, Programs, and Governance; Trackers and Remote Management; BIOS Features; Trustless Execution Technology and Module Platform; Enhancing the Encryption Experience; BitLocker and TrueCrypt; Summary; Endnotes; Chapter 6. Pod Slurping; Attack of the Data Snatchers
  • Anatomy of a SlurpHow to Recreate the Attack; Risky Business; Pod Proliferation; Advancements in This Attack; Breaking Out of Jobs' Jail; Mitigating Measures; Put Your Clients on a Data Diet; Hijacking an iPhone; Summary; Endnotes; Chapter 7. Social Engineering and USB Come Together for a Brutal Attack; Brain Games; Hacking the Wetware; Reverse Social Engineering; Penetration of a Vulnerable Kind; Elevated Hazards; Legitimate Social Engineering Concerns; Generations of Influences; USB Multipass; Thwarting These Behaviors; Security Awareness and Training; Behavioral Biometrics
  • Windows Enhancements