[Pluralsight] USB Forensics: Writeblocking and Impersonation | Pluralsight
USB Forensics: Writeblocking and Impersonation | Pluralsight

USB Forensics: Writeblocking and Impersonation | Pluralsight

image description

Course Description

This course will show how to writeblock USB mass storage devices on a Linux computer and how to build two useful microcontroller-based devices. The devices include a USB writeblocker and USB impersonator. USB devices have become part of many forensic investigations and penetration tests. In this course, USB Forensics: Writeblocking and Impersonation, you'll learn USB forensics and penetration testing with the USB forensics writeblocking and impersonation. First, you'll explore easily and cheaply writeblocking USB mass storage devices in Linux. Next, you'll create an affordable USB pocket writeblocker. Finally, you'll discover how to build a USB impersonator that can bypass endpoint security software. By the end of this course, you'll know how to writeblock USB drives both on your Linux forensics workstation and using a small device while on the go.

What you will learn

Hi everyone, my name is Philip Polstra and welcome to my course USB Forensics: Writeblocking and Impersonation. I'm a professor, I teach computer forensics and security at Bloomsburg University of Pennsylvania. Now USB devices have become part of many forensic investigations and penetration tests in recent years, this course is a follow on to the USB forensics fundamentals and USB forensic duplication courses. Some of the major things we're going to talk about in this course - we're going to talk about how you can easily and cheaply writeblock USB mass storage devices on a Linux workstation. We're also going to talk about a cheap and easy to build USB pocket writeblocker that you can use while you're on the go. And finally, we will learn how you can build a USB impersonator that can be used to bypass endpoint security software. By the end of this course you'll know how to writeblock USB drives on your Linux forensics workstation and using a small device that you can use while you're on the go, you will also have a powerful penetration testing tool for your toolbox in the form of a USB impersonator. I hope you'll join me on this journey to learn USB forensics and penetration testing with the USB Forensics Writeblocking and Impersonation course at Pluralsight.

Curriculum

Section 1: Course Overview

Section 2: Software Write Blocking with Udev Rules

Section 3: Hardware Write Blocker Based on VNC2

Section 4: USB Impersonation