Presented at Black Hat USA 2013
Aug. 1, 2013, 5 p.m.
Manufacturers of mobile devices often multiplex several wired interfaces onto a single connector. Some of these interfaces, probably intended for test and development, are still enabled when the devices ship. We'll show you how you can get a shell on a popular mobile phone via its USB port without using a USB connection and we will release an open source tool for exploring multiplexed wired interfaces.
Kyle Osborn / Kos
- AppSec Consulting
as Kyle Osborn
Kyle Osborn is the lead security engineer at an electric car manufacturer in Silicon Valley where he manages web application, network, and product security. He plays a bad guy at the Western Regional Collegiate Cyber Defense Competition, and has developed a CTF, with his team, for the United States Cyber Challenge "Cyber Camps", which a number of campers competed in. Osborn has previously discussed browser and mobile security at prominent conferences such as BlackHat USA, DefCon, Toorcon, DerbyCon, Hacker Halted, and more.
- Great Scott Gadgets
Michael Ossmann is a wireless security researcher who makes hardware for hackers. He founded Great Scott Gadgets in an effort to put exciting, new tools into the hands of innovative people.