Building Trojan Hardware at Home

Presented at Black Hat Asia 2014, Unknown date/time (Unknown duration).

How much do you trust the hardware shipped to your office or purchased at the local computer store. It may surprise you how easy it can be to change hardware into a Trojan. This presentation will show attendees how they can change computer peripherals from around the house into an attack platform. The great thing is you don't need a great understanding of hardware to leverage this attack.


Presenters:

  • JP Dunning
    JP Dunning is a security consultant. His research interests include wireless and portable security. He is the primary developer on Katana: Portable Multi-Boot Security Suite and author of several wireless security tools. He maintains www.hackfromacave.com for publishing projects and research.

Links:

Similar Presentations: