USB Hacking

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search

Zusammenfassung

Description what this documentation is about.

O.MG Kabel

  • Operating system: Ubuntu 18.04 bionic amd64
  • Packages: git emacs

In order to complete these steps, you must have followed Some Other Documentation before.

O.MG Kabel Setup

Step 1

Enter these commands in the shell

echo foo
echo bar

Step 2

USBNinja Kabel

USB-Ninja.jpg

Das USBNinja Kabel ist ein Informationssicherheits- und Penetrationstest-Tool. Es ermöglicht das Ausführen von Payloads beim Anschließen des USB Kabels, indem es vortäuscht ein HID Gerät zu sein wie zum Beispiel eine Tastatur oder eine Maus. Die Programmierung des Kabels erfolgt über die Arduino IDE, was eine einfache und benutzerfreundliche Methode für die Verwendung von USB Ninja darstellt.

USBNinja Cable Setup

Step 1

To start with the USB NINJA cable, it is necessary to first access the official website at https://usbninja.com/help/

USBNinja 1.jpeg

Step 2

Then, it is essential to strictly follow the steps described on the USBNinja website

USBNinja 2.jpeg

Step 3

After downloading the required boot driver and the Arduino IDE, it is imperative to run both as administrator to avoid future conflicts and then proceed with the installation

USBNinja 3.jpeg


USBNinja 4.jpeg

Step 4

Next, in the Arduino IDE, go to "Preferences" and add the required link

USBNinja 5.jpeg

Step 5

The URL for downloading the required JSON file can be easily found on the USB Ninja website. The link simply specifies the location for the download.

USBNinja 6.jpeg

Step 6

Next, we will open the Board Manager within the Arduino IDE and download the required board for the NINJA cable

USBNinja 7.jpeg

USBNinja 8.jpeg

Step 7

Finally, we simply select the previously downloaded board for the NINJA cable

USBNinja 9.jpeg

Demonstration

Dein OMG Cable Angriff mit der Mail

Scenario

Imagine a hypothetical scenario: Our USB NINJA cable could pose potential dangers. Suppose someone is at an airport and wants to charge their laptop or smartphone. They find a public charging station with USB ports as well as accessible USB cables that can be connected to their laptop. Without thinking, the person connects the charging cable. As soon as the NINJA cable is connected, a threatening message appears on the screen, manipulating the user and causing them to follow the attacker's instructions. This is a typical attack through social engineering.

Threat message.jpeg

Präventive Maßnahmen

  • Operating system: Ubuntu 18.04 bionic amd64
  • Packages: git emacs

In order to complete these steps, you must have followed [[Some Other Doc

Quellen