Many forensic investigations require forensic copies of USB storage devices. This course will teach you how to use the FTDI Vinculum II microcontroller to create a pocket USB forensic duplicator for under $50.
USB devices, especially flash drives, have become commonplace. As a result, USB storage devices are frequently a part of forensic investigations. An easy way of making forensic copies of USB storage devices is needed to facilitate such investigations. This course centers around building an inexpensive pocket forensic duplicator based on the FTDI Vinculum II microcontroller. You will learn the basics of making forensic copies of USB mass storage devices no matter the method employed. While building this device you will also learn how to use microcontrollers and interface with standard electronic peripherals such as LEDs and LCD displays. When you've finished this course, you will have a basic understanding of the Vinculum II microcontroller, which you can apply to more advanced applications such as USB write blocking and device impersonation, which are to be covered in a follow-up course. Software required: Freely available Vinculum II Integrated Development Environment (Windows XP or higher, possibly in a virtual machine). Hardware Required: FTDI V2DIP2 64-pin development module, 5 LEDs of 3 colors (optional), 16x2 LCD display (optional), and prototyping board (optional).
Dr. Phil Polstra (aka Infosec Dr. Phil) is a professor of Digital Forensics at Bloomsburg University. He is also the author of a number of books on hardware hacking and forensics. He has made repeat appearances at DEFCON, BlackHat, B-sides, 44CON, GrrCON, and other conferences all around the world.
Hello everyone, I am Dr. Philip Polstra and welcome to my course on
USB Forensic Duplication. I am a digital forensics professor
at Bloomsburg University of Pennsylvania. I am also a frequent
conference presenter that has spoken on USB forensics, hardware hacking,
Linux forensics, Windows forensics, aviation security, and many other
topics at conferences such as DEFCON, BlackHat, BruCON, GrrCON, and 44CON,
around the world.
USB devices, including flash drives, have become extremely commonplace.
Because of this many forensic investigations now require forensic duplicates
of USB storage devices.
In this course we are going to walk you through building a pocket
USB forensic duplicator based on the FTDI Vinculum II microcontroller.
Some of the major topics that we will cover include:
How to make a forensic copy of a USB storage device
Creating devices with the FTDI Vinculum II microcontroller
Maximizing performance of microcontroller applications
Sprucing up devices by adding LEDs and LCD displays
By the end of this course, you'll have a fully functional forensic device
and a solid foundation to get you started building your own microcontroller
devices and/or those described in the next course on USB write-blocking
You’ll have a solid foundation to start building microcontroller devices
Before beginning this course you should be familiar with the topics
from my USB Forensics Fundamentals course.
I hope you'll join me on this journey to learn more about USB forensics and
microcontrollers with the USB Forensic Duplication course, at Pluralsight.