Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

USB Forensics: Writeblocking and Impersonation

This course will show how to writeblock USB mass storage devices on a Linux computer and how to build two useful microcontroller-based devices. The devices include a USB writeblocker and USB impersonator.

Intermediate
1h 17m
(14)

Created by

Last Updated Aug 12, 2022

Course Thumbnail
  • Course

USB Forensics: Writeblocking and Impersonation

This course will show how to writeblock USB mass storage devices on a Linux computer and how to build two useful microcontroller-based devices. The devices include a USB writeblocker and USB impersonator.

Intermediate
1h 17m
(14)

Created by

Last Updated Aug 12, 2022

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

USB devices have become part of many forensic investigations and penetration tests. In this course, USB Forensics: Writeblocking and Impersonation, you'll learn USB forensics and penetration testing with the USB forensics writeblocking and impersonation. First, you'll explore easily and cheaply writeblocking USB mass storage devices in Linux. Next, you'll create an affordable USB pocket writeblocker. Finally, you'll discover how to build a USB impersonator that can bypass endpoint security software. By the end of this course, you'll know how to writeblock USB drives both on your Linux forensics workstation and using a small device while on the go.

USB Forensics: Writeblocking and Impersonation
Intermediate
1h 17m
(14)
Table of contents

Get started with Pluralsight