BadUSB On accessories that turn evil
|
|
|
- Joel Williams
- 10 years ago
- Views:
Transcription
1 BadUSB On accessories that turn evil Karsten Nohl Sascha Krißler Jakob Lell SRLabs Template v12
2 Demo 1 USB s&ck takes over Windows machine 2
3 Agenda USB background Reprogramming peripherals BadUSB alack scenarios BadUSB exposure Defenses and next steps 3
4 USB devices are recognized using several idenpfiers USB devices Connectors + hubs Host Root hub Iden&fier Interface class End points Serial number (opponal) Examples USB thumb drive 8 Mass Storage 0 Control 1 Data transfers AA Webcam a. 1 Audio b. 14 Video 0 Control 1 Video transfers 6 Audio transfers 7 Video interrupts 0258A350 4
5 USB devices are inipalized in several steps USB device USB plug- and- play Devices can have several iden&&es Power- on + Firmware init Register Set address Send descriptor Set configurapon Normal operapon OpPonal: deregister Load driver A device indicates its capabilipes through a descriptor A device can have several descriptors if it supports mulpple device classes; like webcam + microphone Register again Load another driver Device can deregister and register again as a different device 5
6 USB devices include a micro- controller, hidden from the user USB controller Flash 8051 CPU Bootloader Controller firmware Mass storage The only part visible to the user 6
7 Agenda USB background Reprogramming peripherals BadUSB alack scenarios BadUSB exposure Defenses and next steps 7
8 Reversing and patching USB firmware took 2 months A Document firmware B C Reverse- engineer firmware update process Patch firmware 1. Find leaked firmware and flash tool on the net 2. Sniff update communicapon using Wireshark 3. Replay custom SCSI commands used for updates 4. (Reset bricked devices through short- circuipng Flash pins) 1. Load into disassembler (complicapon: MMU- like memory banking) 2. Apply heurispcs: Count how olen funcpon starts match up with funcpon calls for different memory locapon guesses; the most matches indicate that you guessed right Find known USB bit fields such as descriptors 3. Apply standard solware reversing to find hooking points 1. Add hooks to firmware to add/change funcponality 2. Custom linker script compiles C and assembly code and injects it into unused areas of original firmware Other possible targets We focused on USB spcks, but the same approach should work for: External HDDs Webcams, keyboards Probably many more 8
9 Agenda USB background Reprogramming peripherals BadUSB akack scenarios BadUSB exposure Defenses and next steps 9
10 Demo 2 Windows infects USB s&ck which then takes over Linux machine 10
11 Keyboard emulapon is enough for infecpon and privilege escalapon (w/o need for solware vulnerability) Challenge Linux malware runs with limited user privileges, but needs root privileges to infect further spcks Approach Steal sudo password in screensaver Restart screensaver (or policykit) with password stealer added via an LD_PRELOAD library User enters password to unlock screen Malware intercepts password and gains root privileges using sudo 11
12 Demo 3 Android phone changes DNS sepngs in Windows 12
13 Network traffic can also be diverted by DHCP on USB DNS assignment in DHCP over spoofed USB- Ethernet adapter All DNS queries go to alacker s DNS server AKack steps 1. USB spck spoofs Ethernet adapter 2. Replies to DHCP query with DNS server on the Internet, but without default gateway Result 3. Internet traffic is spll routed through the normal Wi- Fi connecpon 4. However, DNS queries are sent to the USB- supplied server, enabling redirecpon alacks 13
14 Can I charge my phone on your laptop? Android phones are the simplest USB alack plaworm DHCP overrides default gateway over USB- Ethernet Computer sends all Internet traffic through phone Prepara&on Android comes with an Ethernet- over- USB emulapon needing lille configurapon AKack Phone supplies default route over USB, effecpvely interceppng all Internet traffic Proof- of- concept released at: srlabs.de/badusb Hacked by the second factor? Using keyboard emulapon, a virus- infected smartphone could hack into the USB- connected computer. This compromises the second factor security model of online banking. 14
15 Bonus: Virtual Machine break- out 1. VM tenant reprograms USB device (e.g., using SCSI commands) Malicious VM Host 2. USB peripherals spawns a second device that gets connected to the VM host 3. USB device spoofs key strokes, changes DNS, 15
16 Boot- sector virus, USB style Fingerprint OS/BIOS. Patched USB spck firmware can dispnguish Win, Mac, Linux, and the BIOS based on their USB behavior Hide rootkit from OS/AV. When an OS accesses the spck, only the USB content is shown Infect machine when boo&ng. When the BIOS accesses the spck, a secret Linux is shown, boopng a root kit, infecpng the machine, and then boopng from hard disk USB content, for example Linux install image Secret Linux image 16
17 Demo 4 USB thumb drive emulates keyboard and second drive to infect computer during boot 17
18 Family of possible USB alacks is large More akack ideas Effect AKacks shown Emulate keyboard Spoof network card USB boot- sector virus Hide data on s&ck or HDD Rewrite data in- flight Update PC BIOS Spoof display External storage can choose to hide files instead of delepng them Viruses can be added to files added to storage First access by virus scanner sees original file, later access sees virus Emulate a keyboard during boot and install a new BIOS from a file in a secret storage area on a USB spck Emulate a USB display to access security informapon such as Captchas and randomly arranged PIN pads 18
19 Agenda USB background Reprogramming peripherals BadUSB alack scenarios BadUSB exposure Defenses and next steps 19
20 We analyzed the possible reach of BadUSB from two perspecpves Top- down analysis Start from largest USB controller vendors Find their chip families for popular use cases Analyze datasheets and web sites for whether chips can be reprogrammed 5 device classes: Host, Hub, Charger, Storage, Peripheral From top 8 chip vendors Totaling 52 chip families (not every vendor serves each class) BoKom- up analysis Start from actual hardware Open device to find which chips are used Determine whether bootloader and firmware storage (e.g. SPI flash) are available Try to find firmware update tools for their chips Analyzed 33 devices from six device classes: Hub, Input/HID, Webcam, SD adapter, SATA adapter Results released at opensource.srlabs.de 20
21 Both analyses suggest that up to half of USB chips are BadUSB- vulnerable Top- down analysis Probably vulnerable Top- down: Perhaps vulnerable, depends on design / configurapon; BoLom- up: more research needed Unlikely vulnerable BoKom- up analysis Host 4 1 Hub Charger 1 4 Storage Peripheral Input 2 2 Webcam 1 1 SD adapter 4 4 SATA adapter
22 Small hardware design differences can determine BadUSB- vulnerability These USB hubs both contain the same controller chip Only one of them also contains an SPI flash that can store BadUSB modificapons 22
23 Recent trends suggest that BabUSB- exposure is further growing Trend 1 Newer and more complex devices are more vulnerable Trend 2 Chips become more versa&le, and thereby more vulnerable Trend 3 Most controllers that can be programmed are vulnerable Insight Some device types appear more reprogrammable / BadUSB- vulnerable: The early devices of a new standard (e.g. the first available USB 3 devices) Peripherals with special funcponality (e.g. SATA adapter that can copy disks) High- end peripherals Custom- tailored chips in high- volume devices were tradiponally less likely to be reprogrammable; probably because mask ROMs are cheaper than Flash Many such use cases are increasingly served with reprogrammable mulp- purpose chips, that realize economies of scale by combining applicapons USB controllers found not to be reprogrammable were missing an essenpal component for upgrades, such as bootloader or Flash to store the update All those controllers that bring the essenpals seem to be upgradable ProtecPon from malicious updates is very rare: Only one (large) chip family brings fuse bits; none implement firmware signing 23
24 Agenda USB background Reprogramming peripherals BadUSB alack scenarios BadUSB exposure Defenses and next steps 24
25 No effecpve defenses from USB alacks exist Protec&on idea Whitelist USB devices Block cri&cal device classes, block USB completely Scan peripheral firmware for malware Use code signing for firmware updates Disable firmware updates in hardware Limita&on USB devices do not always have a unique serial number OS s don t (yet) have whitelist mechanisms Obvious usability impact Very basic device classes can be used for abuse; not much is lel of USB when these are blocked The firmware of a USB device can typically only be read back with the help of that firmware (if at all): A malicious firmware can spoof a legipmate one ImplementaPon errors may spll allow installing unauthorized firmware upgrades Secure cryptography is hard to implement on small microcontrollers Billions of exispng devices stay vulnerable Simple and effec&ve (but mostly limited to new devices) 25
26 Responsibility for BadUSB mipgapon is unclear No response from chip vendors No response from peripheral vendors No OS vendor response Fixes are not yet in sight Phison, the mostly discussed vendor, notes that they are already offering beler chips. Their customers don t seem to chose them olen Other affected vendors have stayed quiet No affected vendor offers patches or a threat advisory OS implementers do not appear to work on solupon; with one exceppon: FreeBSD adds an oppon to switch off USB enumerapon BadUSB malware vs. becomes more realis&c Sample exploit code for Phison USB 3 controllers was released by Adam Caudill and Brandon Wilson at Derbycon in September Only mipgapon alempts right now are quick fixes such as GData s Keyboard Guard 26
27 USB peripherals can also be re- programmed for construcpve purposes Idea 1 Speed up database queries Data can be parsed on the spck before (or instead of) sending it back to the host Our original mopvapon was to speed up of A5/1 rainbow table lookups Idea 2 Repurpose cheap controller chips Use the reprogrammable chips for other applicapons than USB storage The flowswitch / phison project, for example, aims for a low- cost USB 3 interface for FPGAs 27
28 Take aways USB peripherals provide for a versaple infec&on path Once infected through USB or otherwise malware can use peripherals as a hiding place, hindering system clean- up As long as USB controllers are re- programmable, USB peripherals should not be shared with others QuesPons? [email protected] 28
29 The USB microcontroller market is split among many vendors Wired USB Market Share (2012 Cypress Shareholders MeePng) Others 26% Scope of top- down analysis Microchip (SMSC) 10% Cypress 8% PLX 1% Via Labs 1% Alcor 7% Fresco 1% Displaylink 2% Silicon Labs 3% Exar 2% Silicon MoPon 3% TI 3% JMicron 3% ST- E 4% FTDI 4% Phison 5% Renesas 6% Genesys 5% ASMedia 5% Source: goo.gl/ntn0cf 29
BadUSB On accessories that turn evil
BadUSB On accessories that turn evil Karsten Nohl Sascha Krißler Jakob Lell SRLabs Template v12 Demo 1 USB s&ck takes over Windows machine 2 Agenda
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
The care and feeding of Pythons at the Redmond Zoo. (Using Micro Python and pyboard with Windows)
The care and feeding of Pythons at the Redmond Zoo. (Using Micro Python and pyboard with Windows) Introduction. Pyboard connects to Windows using a standard micro USB cable. It can operate in four different
Security Technology for Smartphones
Security Technology for Smartphones Yasuhiko Abe Hitoshi Ikeda Masafumi Emura Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate
Reviving smart card analysis
Reviving smart card analysis Christopher Tarnovsky Karsten Nohl [email protected] [email protected] Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for
What the student will need:
COMPTIA SERVER+: The Server+ course is designed to help the student take and pass the CompTIA Server+ certification exam. It consists of Book information, plus real world information a student could use
Chapter 1 Hardware and Software Introductions of pcduino
Chapter 1 Hardware and Software Introductions of pcduino pcduino is a high performance, cost effective mini PC platform that runs PC like OS such as Ubuntu Linux. It outputs its screen to HDMI enabled
Lesson 06: Basics of Software Development (W02D2
Lesson 06: Basics of Software Development (W02D2) Balboa High School Michael Ferraro Lesson 06: Basics of Software Development (W02D2 Do Now 1. What is the main reason why flash
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
Practice Test for the 220-801 Domain 1 - PC Hardware (Brought to you by RMRoberts.com)
Practice Test for the 220-801 Domain 1 - PC Hardware (Brought to you by RMRoberts.com) This is a practice test designed to determine if you are ready to take the CompTIA 220-801 certification test. Only
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
Implementation and Implications of a Stealth Hard-Drive Backdoor
March 3rd 2014 OSSIR/JSSI 2014 Paper first presented at ACSAC 2013 Awarded Best Student Paper Award Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach Davide Balzarotti Aure
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Secure USB Flash Drive. Biometric & Professional Drives
Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System Dipl.-Inform. Rolf Haas Principal Security Engineer, S+,CISSP
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Alex Matrosov (@matrosov), Mikhail Gorobets, Oleksandr Bazhaniuk (@ABazhaniuk), Andrew Furtak, Yuriy Bulygin (@c7zero) Advanced Threat Research Agenda Hypervisor
Chapter 5 Busses, Ports and Connecting Peripherals
Chapter 5 Busses, Ports and Connecting Peripherals 1 The Bus bus - groups of wires on a circuit board that carry information (bits - on s and off s) between computer components on a circuit board or within
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION CHECK POINT ALERTED EZCAST THAT ITS SMART TV DONGLE, WHICH IS USED BY APPROXIMATELY 5 MILLION USERS, IS EXPOSED TO SEVERE REMOTE CODE EXECUTION VULNERABILITIES
OpenCPN Garmin Radar Plugin
OpenCPN Garmin Radar Plugin Hardware Interface The Garmin Radar PlugIn for OpenCPN requires a specific hardware interface in order to allow the OpenCPN application to access the Ethernet data captured
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express SQL 2008 R2 Express Restrictions 1 CPU 1 GB Ram Use Limit 10 GB Database Size High Availability Options None (No Database Mirroring,
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing
Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE)
Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE) Andreas Greulich, MELANI Swiss Cyber Storm, 18 April 2009 Agenda Part 1: Introduction (~5 ) Infection
Strategies for Firmware Support of Self-Encrypting Drives
presented by Strategies for Firmware Support of Self-Encrypting Drives UEFI Winter Plugfest February 21-23, 2011 Presented by Jeff Bobzin (Insyde Software, Inc.) Updated 2011-06-01 UEFI Plugfest February
Information Security Training. Assignment 1 Networking
Information Security Training Assignment 1 Networking By Justin C. Klein Keane September 28, 2012 Assignment 1 For this assignment you will utilize several networking utilities
McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012
McAfee Deep Safe Security beyond the OS Kai-Ping Seidenschnur Senior Security Engineer October 16, 2012 Intel/McAfee Initiatives: epo Deep Command and Deep Defender McAfee epo Deep Command Security Management
DESIGNING SECURE USB-BASED DONGLES
DESIGNING SECURE USB-BASED DONGLES By Dhanraj Rajput, Applications Engineer Senior, Cypress Semiconductor Corp. The many advantages of USB Flash drives have led to their widespread use for data storage
Program: Systems Engineering Certificate. Prerequisite: None. Hardware/Software required:
Program: Systems Engineering Certificate Prerequisite: None Hardware/Software required: 1. PC or Mac Any device capable of running remote software. 2. Audio output capable PC so that you can interact with/listen
Bootloader with AES Encryption
...the world's most energy friendly microcontrollers Bootloader with AES Encryption AN0060 - Application Note Introduction This application note describes the implementation of a bootloader capable of
LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011
LOCKSS on LINUX Installation Manual and the OpenBSD Transition 02/17/2011 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 7 BIOS Settings... 10 Installation... 11 Firewall
Lecture 6: Operating Systems and Utility Programs
Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910
UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information
Data Transfer between Two USB Flash SCSI Disks using a Touch Screen
Data Transfer between Two USB Flash SCSI Disks using a Touch Screen Anurag A. Chakravorty #1, Raghwendra J. Suryawanshi *2, # Bachelor of Engineering, Department of Information Technology, Matsyodari Shikshan
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16. AKIPS Pty Ltd
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16 AKIPS Pty Ltd July 5, 2016 1 Copyright Copyright 2015 AKIPS Holdings Pty Ltd. All rights reserved worldwide. No part of this
ViPNet ThinClient 3.3. Quick Start
ViPNet ThinClient 3.3 Quick Start 1991 2014 Infotecs Americas. All rights reserved. Version: 00060-07 34 02 ENU This document is included in the software distribution kit and is subject to the same terms
XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (F Series) 1.
XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (F Series) 1. The suggested interface for your computer is USB2.0 to have better speed
Sistemi ad agenti Principi di programmazione di sistema
Sistemi ad agenti Principi di programmazione di sistema Modulo 6 Why would anyone want to hack or write opensource project for embedded system, when you already have a very powerful and relatively cheap
STLinux Software development environment
STLinux Software development environment Development environment The STLinux Development Environment is a comprehensive set of tools and packages for developing Linux-based applications on ST s consumer
i.mx USB loader A white paper by Tristan Lelong
i.mx USB loader A white paper by Tristan Lelong Introduction This document aims to explain the serial downloader feature of i.mx SoCs on Linux (available across i.mx family starting with i.mx23). This
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Standard
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Standard SQL 2008 R2 Standard Restrictions 4 CPU 64 GB Ram Use Limit 524 PB Database Size High Availability Options Limited Database Mirroring,
Network Projector Operation Guide
Network Projector Operation Guide Table of contents Preparation...3 Connecting the projector with your computer...3 Wired connection... 3 Wireless connection (for selective models)... 4 QPresenter...7
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Nessus Agents. October 2015
Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing
In-System Programmer USER MANUAL RN-ISP-UM RN-WIFLYCR-UM-.01. www.rovingnetworks.com 1
RN-WIFLYCR-UM-.01 RN-ISP-UM In-System Programmer 2012 Roving Networks. All rights reserved. Version 1.1 1/19/2012 USER MANUAL www.rovingnetworks.com 1 OVERVIEW You use Roving Networks In-System-Programmer
13 Ways Through A Firewall What you don t know will hurt you
Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
NetPoint Configuration Guide. for thin clients
NetPoint Configuration Guide for thin clients Contents Layout of this Manual... 2 1.1 Components... 2 You can find the following items in the color box of the device:... 2 1.2 Recommended Server Configuration...
Exploring Layer 2 Network Security in Virtualized Environments. Ronny L. Bull & Jeanna N. Matthews
Exploring Layer 2 Network Security in Virtualized Environments Ronny L. Bull & Jeanna N. Matthews Road Map Context for the Problem of Layer 2 Network Security in Virrtualized Environments Virtualization,
Using AORUS Notebook for the First Time
V2.0 Congratulations on your purchase of the AORUS Notebook! This Manual will help you to get started with setting up your notebook. For more detailed information, please visit our website at http://www.aorus.com.
Reverse engineering hardware for software reversers: studying an encrypted external HDD
Reverse engineering hardware for software reversers: studying an encrypted external HDD Joffrey Czarny & Raphaël Rigo / AGI / TX5IT 2015-10-02 / Hardwear.io 2015-10-02 / Hardwear.io 2 Introduction Why
Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. [email protected].
Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali [email protected] 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers
Low- Cost Chip Microprobing
Low- Cost Chip Microprobing Philipp Maier Karsten Nohl SRLabs Template v11 A few smart cards chips cover numerous security domains Security chip applica.ons Payment
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
Matrix 510/520 User Guide
Matrix 510/520 User Guide Introduction: Matrix 510/520 are ARM9-based Linux ready industrial computer. The key features are as follow: Matrix 520 Layout 1. ARM920T ARM Thumb Processor with 200MIPS at 180MHz,
CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004
CSE331: Introduction to Networks and Security Lecture 32 Fall 2004 Hackers / Intruders External attacks Typical hacker Exploits carried out remotely Does not have an account on the remote machine Insider
Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005
Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)
Embedded Software Development: Spottbillige Hardware + OSS = Zum Spielen zu Schade!
Embedded Software Development: Spottbillige Hardware + OSS = Zum Spielen zu Schade! Gregor Hohpe www.eaipatterns.com OOP 2012 1 Microcontrollers CPU core, memory, and I/O (analog, digital) on one chip
Migrating to ESXi: How To
ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,
Attack Frameworks and Tools
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet
A DIY Hardware Packet Sniffer
A DIY Hardware Packet Sniffer Affordable Penetration Testing for the Individual Veronica Swanson: University of California, Irvine CyberSecurity for the Next Generation North American Round, New York 15
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Check Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
New Mexico Broadband Program. Basic Computer Skills. Module 1 Types of Personal Computers Computer Hardware and Software
New Mexico Broadband Program Basic Computer Skills Module 1 Types of Personal Computers Computer Hardware and Software Basic Computer Skills Learning Objectives Acquire introductory familiarity with basic
Wireless Presentation Adaptor User s Manual
Wireless Presentation Adaptor User s Manual (Model Name: WPS-Dongle 2) Version: 2.0 Date: Apr. 28, 2011 1 Table of Contents 1. Overview... 4 2. Quick Start... 6 3. Windows Client Utility... 9 3.1 Starting
Best Practice Document Hints and Tips
Marshal Ltd. Date: 02/06/2007 Marshal EndPoint Security From Best Practice Document Hints and Tips Marshal Software Ltd CSL 005 Marshal EndPoint Security Best Practice (2) Privacy Control: None Version:
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
FAQ for USB Flash Drive
FAQ for USB Flash Drive 1. What is a USB Flash Drive? A USB Flash Drive consists of a flash memory data storage device integrated with a USB interface. USB Flash Drives are typically removable and rewritable.
Practical Mac OS X Insecurity. Security Concepts, Problems and Exploits on your Mac
Practical Mac OS X Insecurity Security Concepts, Problems and Exploits on your Mac Who am I? Student of physics, mathematics and astronomy in Bonn Mac user since 1995 I love Macs Mac evangelist Intentions
Spyware Analysis. [email protected]. Security Event - April 28, 2004 Page 1
Spyware Analysis [email protected] Security Event - April 28, 2004 Page 1 Content Definition & types of spyware Statistics Hooks Static vs. dynamic software analysis Test environment for spyware Analysis
Trusteer Rapport Virtual Implementation Scenarios
Trusteer Rapport Virtual Implementation Scenarios Technical White Paper Version 1.0 October 2012 new threats, new thinking Contents About this Document 1 1. Overview of Virtual Desktop/Machine Environments
