ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

DEF CON 25 - Mark Williams, Rob Stanley - If You Give a Mouse a Microchip

Автор: DEFCONConference

Загружено: 2017-11-02

Просмотров: 27174

Описание: The International, a recent esports tournament, had a 20 million dollar prize pool with over five million people tuned in to the final match. The high stakes environment at tournaments creates an incentive for players to cheat for a competitive advantage. Cheaters are always finding new ways to modify software, from attempting to sneak executables in on flash drives, to using cheats stored in Steam's online workshop which bypasses IP restrictions.

This presentation describes how one can circumvent existing security controls to sneak a payload (game cheat) onto a target computer. Esports tournaments typically allow players to provide their own mouse and keyboard, as these players prefer to use specific devices or may be obligated to use a sponsor branded device. These "simple" USB input devices can still be used to execute complex commands on a computer via the USB Human Interface Device (HID) protocol.

Our attack vector is a mouse with an ARM Cortex M series processor. The microcontroller stores custom user profiles in flash memory, allowing the mouse to retain user settings between multiple computers. We modify the device's firmware to execute a payload delivery program, stored in free space in flash memory, before returning the mouse to its original functionality. Retaining original functionality allows the mouse to be used discreetly, as it is an "expected" device at these tournaments. This concept applies to any USB device that uses this processor, and does not require obvious physical modifications.

This delivery method has tradeoffs. Our exploit is observable, as windows are created and in focus during payload delivery. The advantage to this approach is that it bypasses other security measures that are commonly in place, such as filtered internet traffic and disabled USB mass storage.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
DEF CON 25 - Mark Williams, Rob Stanley - If You Give a Mouse a Microchip

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards -  Bertocchi, Campbell, Gibson, Harris

DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

DEF CON 25 Conference - Denton Gentry  - I Know What You Are by the Smell of Your Wifi

DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

DEF CON 26  - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86

DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86

Ethical Hacker Barnaby Jack Passes Before Revealing Pacemaker Hack @McAfeeConsumer

Ethical Hacker Barnaby Jack Passes Before Revealing Pacemaker Hack @McAfeeConsumer

DEF CON 25 - Luke Young - There’s no place like 127.001: Achieving reliable DNS rebinding

DEF CON 25 - Luke Young - There’s no place like 127.001: Achieving reliable DNS rebinding

DEF CON 25 - Marina Simakov, Igal Gofman - Gaining persistency by abusing advanced authe

DEF CON 25 - Marina Simakov, Igal Gofman - Gaining persistency by abusing advanced authe

DEF CON 25 - Marc Newlin, Logan Lamb, Chris Grayson - CableTap: Wirelessly Tapping Home Networks

DEF CON 25 - Marc Newlin, Logan Lamb, Chris Grayson - CableTap: Wirelessly Tapping Home Networks

Новый китайский ИИ DuClaw сделал OpenClaw мгновенным и непобедимым.

Новый китайский ИИ DuClaw сделал OpenClaw мгновенным и непобедимым.

DEF CON 25 - Saif El Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects

DEF CON 25 - Saif El Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects

Hack All The Things: 20 Devices in 45 Minutes

Hack All The Things: 20 Devices in 45 Minutes

Jmaxxz - Your Car is My Car -  DEF CON 27 Conference

Jmaxxz - Your Car is My Car - DEF CON 27 Conference

DEF CON 25 - Andy Robbins, Will Schroeder - Designing Active Directory DACL Backdoors

DEF CON 25 - Andy Robbins, Will Schroeder - Designing Active Directory DACL Backdoors

Why SOPs Are the Backbone of Scalable Tech Companies With Matt Strippelhoff

Why SOPs Are the Backbone of Scalable Tech Companies With Matt Strippelhoff

DEF CON 25 Recon Village  - Jason Haddix - Domain Discovery:Expanding Your Scope Like A Boss

DEF CON 25 Recon Village - Jason Haddix - Domain Discovery:Expanding Your Scope Like A Boss

DEF CON 25 - David Robinson -  Using GPS Spoofing to control time

DEF CON 25 - David Robinson - Using GPS Spoofing to control time

Breaking the x86 Instruction Set

Breaking the x86 Instruction Set

"I am a Mainframer" with Enzo Damato, Mainframe Nerd, Researcher, Student, and Teacher

DEF CON 31 - Contactless Overflow Code Execution in Payment Terminals & ATMs - Josep Rodriguez

DEF CON 31 - Contactless Overflow Code Execution in Payment Terminals & ATMs - Josep Rodriguez

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]