skip to content
Seven deadliest USB attacks Preview this item
ClosePreview this item
Checking...

Seven deadliest USB attacks

Author: Brian Anderson; Barbara Anderson; Andrew Rabie
Publisher: Amsterdam ; Boston : Elsevier ; Burlington, Mass. : Syngress, ©2010.
Series: Syngress seven deadliest attacks series.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. The book consists of seven chapters that cover the following: (i) USB Hacksaw; (ii) the USB Switchblade; (iii) viruses and malicious codes; (iv) USB-based heap overflow; (v) the  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Brian Anderson; Barbara Anderson; Andrew Rabie
ISBN: 1282738267 9781282738263 9781597495547 1597495549
OCLC Number: 765143748
Notes: Title from title screen.
Description: 1 online resource.
Contents: Cover13; --
Half Title Page --
Series Title Page --
Title Page --
Copyright Page --
Table of Contents --
About the Authors --
Introduction --
Chapter 1. USB Hacksaw --
Sharing Away Your Future --
Anatomy of the Attack --
Universal Serial Bus --
U3 and Flash Drive CD-ROM Emulation --
Inside the Hacksaw Attack --
Hacksaw Removal --
What Is the Big Deal? --
Regulators, Mount Up --
Evolution of the Portable Platform --
Portable Platforms --
Hacksaw Development --
Defending against This Attack --
Summary --
Endnotes --
Chapter 2. USB Switchblade --
Passing Grades --
Inside the Switchblade --
Switchblade Tool Summaries --
Switchblade Assembly --
Why Should I Care? --
Evolving Aspects --
Privilege Elevation --
Defensive Techniques --
System Execution Prevention and USB Antidote --
Biometrics and Token Security --
Password Protection Practices --
Windows Group Policy Options --
Browser Settings and Screen Savers --
Summary --
Chapter 3. USB-Based Virus/Malicious Code Launch --
Invasive Species among Us --
An Uncomfortable Presentation --
Anatomy of the Attack --
Malicious Code Methodologies --
Autorun --
How to Recreate the Attack --
Evolution of the Attack --
Why All the Fuss? --
Botnets --
Distributed Denial-of-Service Attacks --
E-mail Spamming --
Infecting New Hosts --
Identity Theft --
Transporting Illegal Software --
Google AdSense and Advertisement Add-On Abuse --
Defending against This Attack --
Antimalware --
Summary --
Endnotes --
Chapter 4. USB Device Overflow --
Overflow Overview --
Analyzing This Attack --
Device Drivers --
Going with the Overflow --
USB Development and the Hole in the Heap --
Ever-Present Exposures --
Overflow Outlook --
Defensive Strategies --
Drivers --
Physical Protection Mechanisms --
Summary --
Endnote --
Chapter 5. RAM dump --
Gadgets Gone Astray --
Digital Forensic Acquisition Examination --
Computer Online Forensic Evidence Extractor or Detect and Eliminate Computer-Assisted Forensics? --
Memory Gatherings --
Reconstructing the Attack --
Mind Your Memory --
Advancements in Memory Analysis --
ManTech DD --
Additional Analysis Tools --
Future Memories --
The Room with an Evil View --
Hindering the Gatherers --
Security Framework, Programs, and Governance --
Trackers and Remote Management --
BIOS Features --
Trustless Execution Technology and Module Platform --
Enhancing the Encryption Experience --
BitLocker and TrueCrypt --
Summary --
Endnotes --
Chapter 6. Pod Slurping --
Attack of the Data Snatchers --
Anatomy of a Slurp --
How to Recreate the Attack --
Risky Business --
Pod Proliferation --
Advancements in This Attack --
Breaking Out of Jobs Jail --
Mitigating Measures --
Put Your Clients on a Data Diet --
Hijacking an iPhone --
Summary --
Endnotes --
Chapter 7. Social Engineering and USB Come Together for a Brutal Attack --
Brain Games --
Hacking the Wetware --
Reverse Social Engineering --
Penetration of a Vulnerable Kind --
Elevated Hazards --
Legitimate Social Engineering Concerns --
Generations of Influences --
USB Multipass --
Thwarting These Behaviors --
Security A.
Series Title: Syngress seven deadliest attacks series.
Responsibility: Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie.

Abstract:

Details the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. This title helps you discover the best ways to  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"Seven Deadliest USB Attacks provides real-world insight into issues a good deal of computer users don't even realize exist. The author's clear voice profiles attack scenarios, tools, as well as Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(2)

User lists with this item (2)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/765143748> # Seven deadliest USB attacks
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
   library:oclcnum "765143748" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/344443617#Place/amsterdam> ; # Amsterdam
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/ne> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/344443617#Place/burlington_mass> ; # Burlington, Mass.
   library:placeOfPublication <http://dbpedia.org/resource/Boston> ; # Boston
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:author <http://viaf.org/viaf/230144929021754440823> ; # Barbara Anderson
   schema:bookFormat schema:EBook ;
   schema:copyrightYear "2010" ;
   schema:creator <http://viaf.org/viaf/196931139> ; # Brian James Anderson
   schema:datePublished "2010" ;
   schema:description "Cover13; -- Half Title Page -- Series Title Page -- Title Page -- Copyright Page -- Table of Contents -- About the Authors -- Introduction -- Chapter 1. USB Hacksaw -- Sharing Away Your Future -- Anatomy of the Attack -- Universal Serial Bus -- U3 and Flash Drive CD-ROM Emulation -- Inside the Hacksaw Attack -- Hacksaw Removal -- What Is the Big Deal? -- Regulators, Mount Up -- Evolution of the Portable Platform -- Portable Platforms -- Hacksaw Development -- Defending against This Attack -- Summary -- Endnotes -- Chapter 2. USB Switchblade -- Passing Grades -- Inside the Switchblade -- Switchblade Tool Summaries -- Switchblade Assembly -- Why Should I Care? -- Evolving Aspects -- Privilege Elevation -- Defensive Techniques -- System Execution Prevention and USB Antidote -- Biometrics and Token Security -- Password Protection Practices -- Windows Group Policy Options -- Browser Settings and Screen Savers -- Summary -- Chapter 3. USB-Based Virus/Malicious Code Launch -- Invasive Species among Us -- An Uncomfortable Presentation -- Anatomy of the Attack -- Malicious Code Methodologies -- Autorun -- How to Recreate the Attack -- Evolution of the Attack -- Why All the Fuss? -- Botnets -- Distributed Denial-of-Service Attacks -- E-mail Spamming -- Infecting New Hosts -- Identity Theft -- Transporting Illegal Software -- Google AdSense and Advertisement Add-On Abuse -- Defending against This Attack -- Antimalware -- Summary -- Endnotes -- Chapter 4. USB Device Overflow -- Overflow Overview -- Analyzing This Attack -- Device Drivers -- Going with the Overflow -- USB Development and the Hole in the Heap -- Ever-Present Exposures -- Overflow Outlook -- Defensive Strategies -- Drivers -- Physical Protection Mechanisms -- Summary -- Endnote -- Chapter 5. RAM dump -- Gadgets Gone Astray -- Digital Forensic Acquisition Examination -- Computer Online Forensic Evidence Extractor or Detect and Eliminate Computer-Assisted Forensics? -- Memory Gatherings -- Reconstructing the Attack -- Mind Your Memory -- Advancements in Memory Analysis -- ManTech DD -- Additional Analysis Tools -- Future Memories -- The Room with an Evil View -- Hindering the Gatherers -- Security Framework, Programs, and Governance -- Trackers and Remote Management -- BIOS Features -- Trustless Execution Technology and Module Platform -- Enhancing the Encryption Experience -- BitLocker and TrueCrypt -- Summary -- Endnotes -- Chapter 6. Pod Slurping -- Attack of the Data Snatchers -- Anatomy of a Slurp -- How to Recreate the Attack -- Risky Business -- Pod Proliferation -- Advancements in This Attack -- Breaking Out of Jobs Jail -- Mitigating Measures -- Put Your Clients on a Data Diet -- Hijacking an iPhone -- Summary -- Endnotes -- Chapter 7. Social Engineering and USB Come Together for a Brutal Attack -- Brain Games -- Hacking the Wetware -- Reverse Social Engineering -- Penetration of a Vulnerable Kind -- Elevated Hazards -- Legitimate Social Engineering Concerns -- Generations of Influences -- USB Multipass -- Thwarting These Behaviors -- Security A."@en ;
   schema:description "Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. The book consists of seven chapters that cover the following: (i) USB Hacksaw; (ii) the USB Switchblade; (iii) viruses and malicious codes; (iv) USB-based heap overflow; (v) the evolution of forensics in computer security; (vi) pod slurping; and (vii) the human element of security, including the risks, rewards, and controversy surrounding social-engineering engagements. This book was written to target a vast audience including students, technical staff, business leaders, or anyone seeking to understand fully the removable-media risk for Windows systems. It provides the tools, tricks, and detailed instructions necessary to reconstruct and mitigate these activities while peering into the risks and future aspects surrounding the respective technologies. The attacks outlined in this book are intended for individuals with moderate Microsoft Windows proficiency. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don{u2019}t be caught defenseless again, and learn techniques to make your computer and network impenetrable."@en ;
   schema:editor <http://viaf.org/viaf/171631432> ; # Andrew Rabie
   schema:exampleOfWork <http://worldcat.org/entity/work/id/344443617> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/344443617#Series/syngress_seven_deadliest_attacks_series> ; # Syngress seven deadliest attacks series.
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/344443617#Series/the_seven_deadliest_attacks_series> ; # The seven deadliest attacks series
   schema:name "Seven deadliest USB attacks"@en ;
   schema:productID "765143748" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/765143748#PublicationEvent/amsterdam_boston_elsevier_burlington_mass_syngress_2010> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/344443617#Agent/syngress> ; # Syngress
   schema:publisher <http://experiment.worldcat.org/entity/work/data/344443617#Agent/elsevier> ; # Elsevier
   schema:url <http://www.myilibrary.com?id=273826&ref=toc> ;
   schema:url <http://www.totalboox.com/book/id-4827575607199849334> ;
   schema:url <http://www.SLQ.eblib.com.au/patron/FullRecord.aspx?p=566717> ;
   schema:url <http://cdn.totalboox.com/static/covers/ELS/42fefe6fe97cdb76-b.jpg> ;
   schema:url <http://www.books24x7.com/marc.asp?bookid=37233> ;
   schema:url <http://www.myilibrary.com?id=273826> ;
   schema:workExample <http://worldcat.org/isbn/9781597495547> ;
   schema:workExample <http://worldcat.org/isbn/9781282738263> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/765143748> ;
    .


Related Entities

<http://dbpedia.org/resource/Boston> # Boston
    a schema:Place ;
   schema:name "Boston" ;
    .

<http://experiment.worldcat.org/entity/work/data/344443617#Place/burlington_mass> # Burlington, Mass.
    a schema:Place ;
   schema:name "Burlington, Mass." ;
    .

<http://experiment.worldcat.org/entity/work/data/344443617#Series/syngress_seven_deadliest_attacks_series> # Syngress seven deadliest attacks series.
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/765143748> ; # Seven deadliest USB attacks
   schema:name "Syngress seven deadliest attacks series." ;
    .

<http://experiment.worldcat.org/entity/work/data/344443617#Series/the_seven_deadliest_attacks_series> # The seven deadliest attacks series
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/765143748> ; # Seven deadliest USB attacks
   schema:name "The seven deadliest attacks series" ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/171631432> # Andrew Rabie
    a schema:Person ;
   schema:familyName "Rabie" ;
   schema:givenName "Andrew" ;
   schema:name "Andrew Rabie" ;
    .

<http://viaf.org/viaf/196931139> # Brian James Anderson
    a schema:Person ;
   schema:familyName "Anderson" ;
   schema:givenName "Brian James" ;
   schema:givenName "Brian" ;
   schema:name "Brian James Anderson" ;
    .

<http://viaf.org/viaf/230144929021754440823> # Barbara Anderson
    a schema:Person ;
   schema:familyName "Anderson" ;
   schema:givenName "Barbara" ;
   schema:name "Barbara Anderson" ;
    .

<http://worldcat.org/isbn/9781282738263>
    a schema:ProductModel ;
   schema:isbn "1282738267" ;
   schema:isbn "9781282738263" ;
    .

<http://worldcat.org/isbn/9781597495547>
    a schema:ProductModel ;
   schema:isbn "1597495549" ;
   schema:isbn "9781597495547" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.