Preview

Herald of the Kazakh-British Technical University

Advanced search

ANALYSIS OF WORK OF DEVICES WITH BADUSB VULNERABILITY

Abstract

Any interaction of a USB device with a computer is carried out using a microcontroller and so that it can carry out actions, a control code is stored in its own service memory that the normal user does not have access to. Each USB device includes a controller chip that can be reprogrammed with a small physical and software impact. This is where the concept of “BadUSB vulnerability” arises. Since this threat works with software and hardware implementation of microcodes, the danger of the threat of BadUSB is high. Since all operating systems of the Windows, Linux, Macintosh family are subject to it, protection against this threat is complicated. And standard manipulations with the reinstallation of the operating system, which are a universal solution for most vulnerabilities, are not able to “cure” a computer infected with BadUSB media. In this paper, a description and analysis of the work of sketches when creating a device with a BadUSB vulnerability is given, and possible methods of protection are given.

About the Author

Ye. Zueva
Казахский Национальный университет им. аль-Фараби
Russian Federation


References

1. А. Пыркова, Е. Зуева. Cоздание BadUSB-устройства и анализ безопасности системы // Вестник КазНИТУ, №5. – 2019. – С.466.

2. Е.А. Зуева, А.Ю. Пыркова. Исследование работы USB-устройств, использующих DuckyScript // Вестник АУЭС. №3. – 2019. – С.53.

3. https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payloads [Дата обращения 12.03.2019]

4. Kaspersky Endpoint Security 10 для Windows: Service Pack 1 Maintenance Release 2 (версия 10.2.4.674) http://support.kaspersky.ru/11979#block1 [Дата обращения 3 мая 2019].

5. Обновление компонентов в продуктах Dr.Web 11.0. https://news.drweb.ru/show/?i=9972&c=5&lng=ru&p=0 [Дата обращения 3 мая 2019].


Review

For citations:


Zueva Ye. ANALYSIS OF WORK OF DEVICES WITH BADUSB VULNERABILITY. Herald of the Kazakh-British Technical University. 2020;17(1):141-146. (In Russ.)

Views: 318


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6688 (Print)
ISSN 2959-8109 (Online)