Bad USB Weaponized

Explore the world of bad USB. How to build, deploy, and optimize the bad USB platform? Command and control structure. Hijinks with bad USB will include results achieved during deployment, systems owned, shells acquired, data acquired and coupling with social engineering and security awareness and training.

Provided by: SecurityTube.net Topic: Hardware Date Added: Apr 2015 Format: Webcast

Find By Topic