USB Penetration Testing, Hardware Security Devices, and USB Forensics

This page keeps all original information and links. Japanese page

Training →Wireshark Open Seminar Education Partners →Books →Conference Speaking →Certifications
VirtualizationQt DevelopmentOpen Seminar ArchiveWireshark Track RecordCyber ​​security track record Information Processing Engineer Exam
List of seminars Kali Linux Fundamentals Kali Linux ApplicationUSB Past Seminars
USBRubberDucky
Course code: USB-1 USB pen testing tools and hardware security equipment utilization and USB analysis forensics seminar
This is an introductory seminar on the utilization of USB pen testing tools and hardware security equipment, including keylogger intrusion attack tools, and USB frame analysis and USB forensics using Wireshark.
KaliNyumon
Seminar name/code
Date/time
Overview

[USB-1] USB Pen Test Tool/Hardware Security Equipment Utilization and USB Analysis Forensic Seminar
(Code:USB-1)

1 day
(10:00-18:00)

This is an introductory seminar on USB frame analysis and USB forensics using USB pen testing tools and hardware security equipment, including keylogger intrusion attack tools, and Wireshark.

Textbook and equipment used
Lecturer
Purpose

★Distribution
・USB pen test tool and hardware security equipment (distribution contents and price will be discussed)
・Wireshark/Kali latest version
・Resume material
・CD-ROM
・USB memory
・Ikeriri bag
・Ikeriri magnet

★Lunch box

★Equipment used
・USB pen test tool
Hardware security equipment
・LAN cable/router
・2 PCs per person (Kali/Windows)
・Target server/practice server/protection server
(Uses a virtualized environment)
・Network environment
・Whiteboard/projector


MegumiTakeshita
Megumi Takeshita

Ikeriri★Network Service Co., Ltd.

learning-photo1


Utilizing USB pen test tools and hardware security equipment, you will actually test the risks of attacks and intrusions, security investigations and countermeasures, and learn through practical training, including USB packet capture using Wireshark.

Learn how to utilize hardware security tools that are actually in circulation, and learn security investigation and defense using USB pen testing tools through practical training.

In addition, students will acquire and analyze USB packets using Wireshark to detect and analyze high-risk USB memory keyloggers that are commonly found around them, and learn forensic methods.

*In addition to Windows and Kali Linux GUI tools, the seminar will also include some CLI operations. It's okay if you're new to Linux, but we're targeting those who have at least one year of work experience, basic computer operations, and experience entering commands at a command prompt.
We also recommend that you have basic knowledge of LAN and TCP/IP.

(Please note) This seminar is designed to learn cyber security attacks and countermeasures in a closed environment for practical training.Actually, hacking into the external Internet violates the Unauthorized Access Act, as well as criminal and civil laws, and may result in punishment. This seminar is strictly a seminar to learn about cyber security attacks and take practical countermeasures. Please confirm and agree to this

Seminar details New

USB attack Intrusion tools and
Hardware security device utilization and testing
Keylogger
Script execution
Springboard
Backdoor
Disguised USB
Wired LAN Wireless LAN connection
KillerUSB and other destructive devices

USB basics and Wireshark preparation
USB Descriptors and USB Endpoint
USB classes

(Note)
This seminar is about cyber security, where you will learn attacks and countermeasures in a closed network for practical training.
violates the Unauthorized Computer Access Act, as well as criminal and civil laws, and may be subject to punishment. This seminar is strictly a seminar to learn about cyber security attacks and take practical countermeasures. Please confirm and agree to this

USB mass storage
File system
USB mass storage communication
USB mass storage
How Writeblock works in the Windows environment

USB cloning and USB impersonation

HID (Human Interface Devices)
HID attacks and countermeasures

USB pen test tool Measures against HW security devices

(About the training environment)
Attack and defense training will be conducted using a test PC, test smartphone, and test virtual server in a closed training network prepared here.
Of course, you can bring your own PC or smartphone, but they will not be able to connect to the training network. You can use it by connecting to a separate wireless LAN from the training.

List of seminars Kali Linux Fundamentals Kali Linux ApplicationUSB Past Seminars
Training →Wireshark Open Seminar Education Partners →Books →Conference Speaking →Certifications
VirtualizationQt DevelopmentOpen Seminar ArchiveWireshark Track RecordCyber ​​security track record Information Processing Engineer Exam

Copyright Ikeriri Network Service Limited,All Rights Reserved.

English articles of incorporation Privacy policy site map search inquiry