Gift Guide

Seven Deadliest USB Attacks

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $13.68
Usually ships in 1-2 business days
(Save 49%)
Other sellers (Paperback)
  • All (9) from $13.68   
  • New (6) from $20.66   
  • Used (3) from $13.68   


Do you need to keep up with the latest hacks, attacks, and exploits affecting USB technology? Then you need Seven Deadliest Attacks Series. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Attacks detailed in this book include:

1 USB Hacksaw

2 USB Switchblade

3 USB Based Virus/Malicous Code Launch

4 USB Device Overflow

5 RAMdump

6 Pod Slurping

7 Social Engineering and USB Technology

Read More Show Less

Editorial Reviews

From the Publisher

"Seven Deadliest USB Attacks provides real-world insight into issues a good deal of computer users don't even realize exist. The author's clear voice profiles attack scenarios, tools, as well as mitigation techniques. This book raises the right questions and provides the right answers" - Mirko Zorz, Editor in Chief of Help Net Security and (IN)SECURE Magazine

Read More Show Less

Product Details

  • ISBN-13: 9781597495530
  • Publisher: Elsevier Science
  • Publication date: 5/6/2010
  • Pages: 256
  • Product dimensions: 7.40 (w) x 9.10 (h) x 0.80 (d)

Meet the Author

Brian Anderson started his security career as a USMC Military Police officer. During his tour in the USMC Brian also served as an instructor for weapons marksmanship, urban combat, building entry techniques and less than lethal munitions. He also took part in the Somalia humanitarian efforts and several training engagements in the Middle East.

Brian’s technical experience began when he joined EDS where he became part of a leveraged team and specialized in infrastructure problem resolution, disaster recovery and design and security. His career progression was swift carrying him through security engineering and into architecture where he earned a lead role. Brian was a key participant in many high level security projects driven by HIPAA, PCI, SOX, FIPS and other regulatory compliance which included infrastructure dependent services, multi-tenant directories, IdM, RBAC, SSO, WLAN, full disk and removable media encryption, leveraged perimeter design and strategy. He has earned multiple certifications for client, server and network technologies. Brian has written numerous viewpoint and whitepapers for current and emerging technologies and is a sought out expert on matters of security, privacy and penetration testing. Brian is an avid security researcher with expertise in reverse engineering focusing on vulnerabilities and exploits and advising clients on proper remediation.

Barbara Anderson has worked in the information technology industry as a network and server security professional for over eleven years. During that time, she has been acting as a senior network security engineer who provides consulting and support for all aspects of network and security design. Barbara comes from a strong network security background and has extensive experience in enterprise design, implementation and life-cycle management.

Barbara proudly served her country for over four years in the United States Air force and has enjoyed successful positions at EDS, SMU, Fujitsu, ACS and Fishnet Security. These experiences and interactions have allowed her to become an expert in enterprise security, product deployment and training.

Read More Show Less

Table of Contents

About the Authors ix

Introduction xi

Chapter 1 USB Hacksaw 1

Sharing Away your Future 2

Anatomy of the Attack 5

Universal Serial Bus 5

U3 and Flash Drive CD-ROM Emulation 5

Inside the Hacksaw Attack 6

Hacksaw Removal 17

What is the Big Deal? 17

Regulators, Mount Up 18

Evolution of the Portable Platform 20

Portable Platforms 20

Hacksaw Development 22

Defending against This Attack 23

Summary 26

Endnotes 26

Chapter 2 USB Switchblade 27

Passing Grades 28

Inside the Switchblade 31

Switchblade Tool Summaries 32

Switchblade Assembly 38

Why Should I Care? 51

Evolving Aspects 52

Privilege Elevation 54

Defensive Techniques 54

System Execution Prevention and USB Antidote 55

Biometrics and Token Security 57

Password Protection Practices 57

Windows Group Policy Options 60

Browser Settings and Screen Savers 61

Summary 63

Chapter 3 USB-Based Virus/Malicious Code Launch 65

Invasive Species among Us 66

An Uncomfortable Presentation 67

Anatomy of the Attack 69

Malicious Code Methodologies 69

Autorun 74

How to Recreate the Attack 79

Evolution of the Attack 85

Why all the Fuss? 88

Botnets 88

Distributed Denial-of-Service Attacks 88

E-mail Spamming 88

Infecting New Hosts 89

Identity Theft 89

Transporting Illegal Software 89

Google AdSense and Advertisement Add-On Abuse 89

Defending against this Attack 90

Antimalware 92

Summary 96

Endnotes 96

Chapter 4 USB Device Overflow 97

Overflow Overview 97

Analyzing this Attack 99

Device Drivers 99

Going with the Overflow 100

USB Development and the Hole in the Heap 103

Ever-Present Exposures 105

Overflow Outlook 106

Defensive Strategies 107

Drivers 107

Physical Protection Mechanisms 114

Summary 115

Endnote 116

Chapter 5 RAM dump 117

Gadgets Gone Astray 118

Digital Forensic Acquisition Examination 118

Computer Online Forensic Evidence Extractor or Detect and Eliminate Computer-Assisted Forensics? 119

Memory Gatherings 120

Reconstructing the Attack 122

Mind your Memory 133

Advancements in Memory Analysis 136

ManTech DD 136

Additional Analysis Tools 140

Future Memories 141

The Room with an Evil View 141

Hindering the Gatherers 143

Security Framework, Programs, and Governance 143

Trackers and Remote Management 145

BIOS Features 147

Trustless Execution Technology and Module Platform 148

Enhancing the Encryption Experience 149

BitLocker and TrueCrypt 150

Summary 151

Endnotes 151

Chapter 6 Pod Slurping 153

Attack of the Data Snatchers 154

Anatomy of a Slurp 155

How to Recreate the Attack 156

Risky Business 157

Pod Proliferation 158

Advancements in This Attack 159

Breaking Out of Jobs' Jail 160

Mitigating Measures 170

Put your Clients on a Data Diet 170

Hijacking an iPhone 173

Summary 175

Endnotes 176

Chapter 7 Social Engineering and USB come Together for a Brutal Attack 177

Brain Games 178

Hacking the Wetware 179

Reverse Social Engineering 179

Penetration of a Vulnerable Kind 180

Elevated Hazards 204

Legitimate Social Engineering Concerns 205

Generations of Influences 206

USB Multipass 208

Thwarting These Behaviors 208

Security Awareness and Training 208

Behavioral Biometrics 210

Windows Enhancements 211

Summary 216

Overview 216

Endnotes 217

Index 219

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)