Introduction to Penetration Testing with BadUSB

This page keeps all original information and links. Japanese page

Training →Wireshark Open Seminar Education Partners →Books →Conference Speaking →Certifications
VirtualizationQt DevelopmentOpen Seminar ArchiveWireshark Track RecordCyber ​​security track record Information Processing Engineer Exam
List of seminars Introduction to KaliLinux KaliLinux ApplicationUSB Past Seminars
KaliNyumon
Hak5 USB Rubber Ducky compatible
Introduction to penetration testing with BadUSB
Our company Takeshita giving practical training and lectures at DEFCON is presented by Bad USB.
Practice the penetration training procedure on an actual machine.

Seminar name/code
Date/time
Overview

by BadUSB
Introduction to Penetration Testing
New
(Code: BadUSB-1)

1 day
(10:00-18:00)

Takeshita, who gives practical training and lectures at DEFCON Packet Capture Village in Las Vegas, will be holding an open demonstration of penetration testing using BadUSB, which is conducted by the Self-Defense Forces and the Ministry of Defense. You can actually run it and check it using PC, smartphone (Android), and Kali Linux.

Textbook and equipment used
Lecturer
Purpose

★Distribution
・Bad USB Hak5 company
USB Rubber Ducky
・Resume materials
・CD-ROM
・USB memory
・Ikeriri bag
・Ikeriri magnet

★Equipment used
・LAN cable/router
・2 PCs per person
(Kali Linux/Windows)
・One smartphone per person
(Android)
・Network environment
・Whiteboard
·projector


MegumiTakeshita
Megumi Takeshita

Ikeriri★Network Service Co., Ltd.

learning-photo1



Introduction to penetration testing with Bad USB devices

in generalAttacks on systems by devices called BadUSB devices are one of the threats. In this seminar, BadUSB will actually conduct a penetration test using Hak5's USB Rubber Ducky, and Purpose is to enable you to perform penetration tests with BadUSB devices.

*Although it is okay to attend the seminar even if you are new to Linux, we are targeting those who have at least one year of practical experience, basic computer operations, and experience entering commands at a command prompt.
We also recommend that you have basic knowledge of LAN and TCP/IP.

(Please note) This seminar is designed to learn cyber security attacks and countermeasures in a closed network for practical training.Actually, hacking into the external Internet violates the Unauthorized Access Act, as well as criminal and civil laws, and may result in punishment. This seminar is strictly a seminar to learn about actual cyber security attacks and take countermeasures. Please confirm and agree to this

Seminar details New

Introduction to Bad USB devices
Preparing the Ducky Script environment
Ducky Script Basics
Button/LED/operation mode control
Spoofing vendor ID, product ID, and USB variables
About Rubber Ducky constants and variables
About Rubber Ducky operators and control structures
About Rubber Ducky functions
Rubber Ducky Application Instructions
Rubber Ducky data output (leaked)
Rubber Ducky extensions

Rubber Ducky FAQs and TIPS
Penetration testing exercise (1)
Penetration testing exercise (2)
Penetration testing exercise (3)
Penetration test flow
Penetration testing guidelines
BadUSB penetration example

List of seminars Introduction to KaliLinux KaliLinux ApplicationUSB Past Seminars

Copyright Ikeriri Network Service Limited,All Rights Reserved.

English articles of incorporation Privacy policy site map search inquiry