18 Oct 2017
This week I presented my proof of concept USB HID attack called “Keynterceptor” at the hack.lu security conference in Luxembourg. It might not be ground-breaking research, but it’s showing a combination of vectors that have not been publicly disclosed yet. Classic key-stroke injecting devices like the RubberDucky are not very stealthy. With this attack, I intend to be less obvious to detect while being able to bypass known protection mechanisms like USG (hardware), DuckHunt (Windows) and USBGuard (Linux).
Since Keynterceptor is made up from very affordable, off-the-shelf electronic parts, it is likely that such an attack tool can be created and used by someone with few resources. The goal of this presentation it to raise awareness (like many other before me have also done) on the state of trust in our daily devices.
Watch the recording of my talk by clicking the image below: