Ethical Hacking with Hardware Gadgets

Learn all about USB attacks, USB Rubber Ducky, HID Attacks, BadUSB, keystroke injections, WiFi jamming. What will i learn? Explore the threat landscape: USBs, WiFi jammers Learn common tools and techniques used Practical skillset in defeating hardware-based threats Extend your cyber security know-how for hardware-based tools Description In this course we will have a look at a couple of hardware gadgets which can be used for hacking. USB Hacking I will present you how a keystroke injection attack works and present USB sticks like USB Rubber Ducky and while show you how to write your own scripts to exploit this vulnerability. In a series of lecture I will show you how you can build a lower-cost version of the USB R...