Simple play icon Course
Skills Expanded

USB Forensics: Writeblocking and Impersonation

by Philip Polstra

This course will show how to writeblock USB mass storage devices on a Linux computer and how to build two useful microcontroller-based devices. The devices include a USB writeblocker and USB impersonator.

What you'll learn

USB devices have become part of many forensic investigations and penetration tests. In this course, USB Forensics: Writeblocking and Impersonation, you'll learn USB forensics and penetration testing with the USB forensics writeblocking and impersonation. First, you'll explore easily and cheaply writeblocking USB mass storage devices in Linux. Next, you'll create an affordable USB pocket writeblocker. Finally, you'll discover how to build a USB impersonator that can bypass endpoint security software. By the end of this course, you'll know how to writeblock USB drives both on your Linux forensics workstation and using a small device while on the go.

About the author

Dr. Phil Polstra (aka Infosec Dr. Phil) is a professor of Digital Forensics at Bloomsburg University. He is also the author of a number of books including "Hacking and Penetration Testing with Low Power Devices" (Syngress, 2015) and "Linux Forensics from A to Z" (PAP, 2016). He has made repeat appearances at DEFCON, BlackHat, B-sides, 44CON, GrrCON, and spoken at many top conferences all around the world, usually on hardware hacking or forensics. He is also a plane builder and an accomplished a... more

Ready to upskill? Get started