Description
Course info
Level
Intermediate
Updated
March 1, 2017
Duration
1h 17m
Description

USB devices have become part of many forensic investigations and penetration tests. In this course, USB Forensics: Writeblocking and Impersonation, you'll learn USB forensics and penetration testing with the USB forensics writeblocking and impersonation. First, you'll explore easily and cheaply writeblocking USB mass storage devices in Linux. Next, you'll create an affordable USB pocket writeblocker. Finally, you'll discover how to build a USB impersonator that can bypass endpoint security software. By the end of this course, you'll know how to writeblock USB drives both on your Linux forensics workstation and using a small device while on the go.

About the author
About the author

Dr. Phil Polstra (aka Infosec Dr. Phil) is a professor of Digital Forensics at Bloomsburg University. He is also the author of a number of books on hardware hacking and forensics. He has made repeat appearances at DEFCON, BlackHat, B-sides, 44CON, GrrCON, and other conferences all around the world.

More from the author
USB Forensics: Duplication
Intermediate
1h 17m
24 May 2016
USB Forensics: Fundamentals
Beginner
2h 9m
5 Nov 2015
Transcript
Transcript

Hi everyone, my name is Philip Polstra and welcome to my course USB Forensics Writeblocking and Impersonation.

I am a professor teaching computer forensics and security at Bloomsburg University of Pennsylvania.

USB devices have become part of many forensic investigations and penetration tests. This course is a follow on to the USB Forensics Fundamentals and USB Forensic Duplication courses.

Some of the major topics that we will cover include:

  1. Easily and cheaply writeblocking USB mass storage devices in Linux.
  2. Creating an affordable USB pocket writeblocker.
  3. Building a USB impersonator that can bypass endpoint security software.
By the end of this course or By the end this course, you’ll know how to writeblock USB drives both on your Linux forensics workstation and using a small device while on the go and will have a powerful penetration testing tool for your toolbox in the form of a USB impersonator.

I hope you’ll join me on this journey to learn USB Forensics and penetration testing with the USB Forensics Writeblocking and Impersonation course, at Pluralsight.