Presented at ToorCon San Diego 19 (2017)
Sept. 2, 2017, 11 a.m.
USB connectivity has become ubiquitous. The sheer variety of USB connected devices ranging from computers and game consoles to resource constrained embedded systems has resulted in a wide variety of vendor-specific protocols and custom USB software stacks. Being able to fuzz, monitor, mitm, or emulate USB can often be a foot in the door for working with black box systems; whether your goal is to build tools that work with existing hardware and software, find vendor interfaces or vulnerabilities to execute custom code, or to play NSA. We introduce our next generation FaceDancer, with more supported hardware, higher speeds, and advanced capabilities for monitoring and mitming USB connections.
Kyle J. Temkin leads the low-level Computer Architectures group at Assured Information Security, researching a variety of hardware hacking and architectural security topics. Kyle maintains and contributes to a variety of open-source projects, and probably spends way too much time reverse engineering and collecting electronic lab equipment.
Dominic is a senior security researcher at Great Scott Gadgets where he writes software and firmware for open source hardware. His primary focus is sniffing and modifying communication protocols.