USB Drop Attacks

Course

Online

£ 40 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Malicious devices are everywhere these days, whether you can see them or not. Some take the form of malicious wireless networks that steal information. Others are physically planted and can do practically anything a hacker desires. These devices are designed to destroy, steal, and infect all kinds of machines. Sometimes these devices can do their malicious tasks without a victim having any idea that they were attacked. In this course, you will learn about one of the most commonly used attacks, the USB drop attack. 

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

This course will teach you what USB drop attacks are and why they are so effective. You will see the different forms these attacks take, including spoofing keyboards, using malicious files/code, using social engineering links that trick victims in various ways, destruction of machines using electricity, and the use of previously unknown vulnerabilities against a target. You will discover how attackers disguise these attacks to make them successful. You get an understanding of the work attackers put into researching targets and deploying devices. Then you will be shown step by step how to conduct three different types of attacks. After learning everything about these attacks, you will learn how to defend against these attacks

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Engineering
  • Works

Course programme

Introduction 1 lecture 07:53 Introduction A brief introduction to the course including prerequisites, learning objectives, and supplemental information. Introduction 1 lecture 07:53 Introduction A brief introduction to the course including prerequisites, learning objectives, and supplemental information. Introduction A brief introduction to the course including prerequisites, learning objectives, and supplemental information. Introduction A brief introduction to the course including prerequisites, learning objectives, and supplemental information. Introduction A brief introduction to the course including prerequisites, learning objectives, and supplemental information. Introduction A brief introduction to the course including prerequisites, learning objectives, and supplemental information. A brief introduction to the course including prerequisites, learning objectives, and supplemental information. A brief introduction to the course including prerequisites, learning objectives, and supplemental information. Basics of USB Drop Attacks 4 lectures 12:27 What is a USB Drop Attack? This section will define was USB drop attacks are and how they work. What is a USB Drop Attack Summary Why are these Attacks Effective? This section explains why USB drop attacks can be effective against its targets. Why are these Attacks Effective Summary Basics of USB Drop Attacks 4 lectures 12:27 What is a USB Drop Attack? This section will define was USB drop attacks are and how they work. What is a USB Drop Attack Summary Why are these Attacks Effective? This section explains why USB drop attacks can be effective against its targets. Why are these Attacks Effective Summary What is a USB Drop Attack? This section will define was USB drop attacks are and how they work. What is a USB Drop Attack? This section will define was USB drop attacks are and how they work. What is a USB Drop Attack? This section will define was USB drop attacks are and how they work. What is a USB Drop Attack? This section will define was USB drop attacks are and how they work. This section will define was USB drop attacks are and how they work. This section will define was USB drop attacks are and how they work. What is a USB Drop Attack Summary What is a USB Drop Attack Summary What is a USB Drop Attack Summary What is a USB Drop Attack Summary Why are these Attacks Effective? This section explains why USB drop attacks can be effective against its targets. Why are these Attacks Effective? This section explains why USB drop attacks can be effective against its targets. Why are these Attacks Effective? This section explains why USB drop attacks can be effective against its targets. Why are these Attacks Effective? This section explains why USB drop attacks can be effective against its targets. This section explains why USB drop attacks can be effective against its targets. This section explains why USB drop attacks can be effective against its targets. Why are these Attacks Effective Summary Why are these Attacks Effective Summary Why are these Attacks Effective Summary Why are these Attacks Effective Summary Types of Attacks 7 lectures 19:05 Types of Attacks Introduction This section will cover the types of USB drop attacks that exist and how each one works, HID Spoofing This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Malicious File/Code This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Social Engineering Links This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. USB Kill This section will explain what USB kill devices are and how they are used. Zero Day This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack. Types of Attacks Summary Types of Attacks 7 lectures 19:05 Types of Attacks Introduction This section will cover the types of USB drop attacks that exist and how each one works, HID Spoofing This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Malicious File/Code This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Social Engineering Links This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. USB Kill This section will explain what USB kill devices are and how they are used. Zero Day This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack. Types of Attacks Summary Types of Attacks Introduction This section will cover the types of USB drop attacks that exist and how each one works, Types of Attacks Introduction This section will cover the types of USB drop attacks that exist and how each one works, Types of Attacks Introduction This section will cover the types of USB drop attacks that exist and how each one works, Types of Attacks Introduction This section will cover the types of USB drop attacks that exist and how each one works, This section will cover the types of USB drop attacks that exist and how each one works, This section will cover the types of USB drop attacks that exist and how each one works, HID Spoofing This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. HID Spoofing This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. HID Spoofing This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. HID Spoofing This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Malicious File/Code This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Malicious File/Code This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Malicious File/Code This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Malicious File/Code This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Social Engineering Links This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Social Engineering Links This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Social Engineering Links This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. Social Engineering Links This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack. USB Kill This section will explain what USB kill devices are and how they are used. USB Kill This section will explain what USB kill devices are and how they are used. USB Kill This section will explain what USB kill devices are and how they are used. USB Kill This section will explain what USB kill devices are and how they are used. This section will explain what USB kill devices are and how they are used. This section will explain what USB kill devices are and how they are used. Zero Day This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack. Zero Day This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack. Zero Day This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack. Zero Day This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack. This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack. This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack. Types of Attacks Summary Types of Attacks Summary Types of Attacks Summary Types of Attacks Summary Disguising, Reconnaissance, and Deployment 5 lectures 19:41 Disguising Attacks Introduction An introduction on disguising, reconnaissance, and deploying USB drop attacks. Disgusing Attacks This section will explain how attacks might disguise a USB drop attacks. Reconnaissance This section explains what reconnaissance is and how attacks may use it before an attack. Deployment This section explains what attackers may do when deploying their attacks. Disguising, Reconnaissance, and Deployment Summary This section summarizes disguising, recon, and deployment strategies attackers may use. Disguising, Reconnaissance, and Deployment. 5 lectures 19:41 Disguising Attacks Introduction An introduction on disguising, reconnaissance, and deploying USB drop attacks. Disgusing Attacks This section will explain how attacks might disguise a USB drop attacks - Hands on Example Part 1 ...

Additional information

A standard USB flash drive of any size A USB device that functions as a Human Interface Device, preferably a USB Rubber Ducky A computer with internet access Text editing software, preferably Notepad++ A free Gmail account A Windows 10 machine (labs will use attacks against Windows 10 OS)

USB Drop Attacks

£ 40 + VAT