USB Forensics: Writeblocking and Impersonation
Pluralsight
Course Summary
This course will show how to writeblock USB mass storage devices on a Linux computer and how to build two useful microcontroller-based devices. The devices include a USB writeblocker and USB impersonator.
-
+
Course Description
USB devices have become part of many forensic investigations and penetration tests. In this course, USB Forensics: Writeblocking and Impersonation, you'll learn USB forensics and penetration testing with the USB forensics writeblocking and impersonation. First, you'll explore easily and cheaply writeblocking USB mass storage devices in Linux. Next, you'll create an affordable USB pocket writeblocker. Finally, you'll discover how to build a USB impersonator that can bypass endpoint security software. By the end of this course, you'll know how to writeblock USB drives both on your Linux forensics workstation and using a small device while on the go.
-
+
Course Syllabus
Course Overview- 1m 46s
—Course Overview 1m 46sSoftware Write Blocking with Udev Rules- 22m 9s
—Udev Rule Basics 7m 9s
—Creating Writeblocking Udev Rules 6m 32s
—Making It Easy with an Install Script 4m 41s
—Writeblocking Demonstration 3m 45sHardware Write Blocker Based on VNC2- 31m 25sUSB Impersonation- 21m 43s