Description: https://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-janansky-waite-harware_trojans.pdf
Last year we presented some hardware trojans as a proof of concept for side-channel data exfiltration attack. Pretty blinking lights are sweet, but this time we wanted to give the hungry crowd something more crunchy to bite into. Namely, that age-old problem of how to get data in and out of a device on a secured network, no network all, or even in a SCIF, perhaps... With some hardware voodoo, let's see what manner of electronic telekinesis we can accomplish!
p.s. Our friends who wish to remain nameless say that this is considered trivial on the other side of the wall. Is it really? Let's see if any show up! That's right, we're laying the bait, let's play spot the fed.
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 17 , defcon 17 , dc-17 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.