SlideShare a Scribd company logo
1 of 20
Damian Gordon
 Although it is difficult to exploit hardware,
there is a lot of interest in device hacking as
it gives so much more control over devices.
 As the security of software becomes more
robust, attackers are looking in other areas to
control systems, and hardware and firmware
are the new targets.
 Newer smartphones and laptops use a USB
port for charging (USB-C port).
 The EU would like a common charger for all
devices, and think USB-C is the way to go:
 The problem is that the
port can take data and
instructions as well as
power, therefore, if I
create a fake charging
station, I can steal all
the data off a phone,
install malware, or do
anything else I want with
the phone.
 So experts have
identified 29 different
types of USB attacks,
and recommend never
to use public chargers.
 Ran Yahalom of Ben-Gurion University
showed the following kinds of USB attacks:
◦ Installation of infections, or other malicious
software, that once connected, have access and
take control of your computer or phone.
◦ Microcontrollers attacks, Microcontrollers (like
an Arduino) can impersonate a USB peripheral
and act like a keyboard or a mouse. Once you
connect, it starts injecting key presses.
◦ Electrical attacks, creating an electrical
component that looks like a flash drive, but
conducts a power surge attack once connected,
and, fry the entire computer or phone.
 There are also some commercial USB
hacking devices:
◦ USBdriveby
◦ KeySweeper
◦ BadUSB
 USBdriveby: This USB stick is easily identified by the
chain attached to it and contains a particularly
nasty surprise inside. Once plugged into a PC, it
begins to imitate your keyboard and uses
keystrokes to disable firewalls, opens backdoors to
allow remote control and tells network monitoring
apps that everything is okay.
 KeySweeper: Disguised as a USB wall charger, the
KeySweeper hack is a very well concealed device
which uses wireless connections to identify and spy
on local Microsoft wireless keyboards. And, by
monitoring keystrokes, KeySweeper can quickly
obtain login details and transmit these back to a
remote location.
 BadUSB: A USB stick hack, BadUSB
impersonates your keyboard to allow itself
to reprogram firmware associated with your
existing USB devices e.g. network cards can
be reprogrammed to send users to sites
containing malicious software which can
soon infect your entire network.
 Bluetooth is a wireless technology standard
for exchanging data between fixed and
mobile devices over short distances.
 It used short-wavelength UHF radio waves
in the industrial, scientific and medical
radio bands, from 2.400 to 2.485 GHz.
 Bluetooth is managed by the Bluetooth
Special Interest Group (SIG),
 BlueBorne is a generic term for several security
vulnerabilities affecting electronic devices
involving various Bluetooth implementations in
Android, iOS, Linux and Windows.
 BlueBorne scans for devices with Bluetooth
enabled and once it finds them, can gain access
in about 10 seconds. Once compromised, the
device expands the reach of the attack, boosting
the signal for the hacker and eliminating the
need for the attack source to be within Bluetooth
range of potential targets.
 WiFi Spoofing
 A spoofing attack is one where a program
successfully masquerades another by
falsifying credentials.
 So if you login to a public WiFi regularly, e.g.
Starbucks, then if a hacker sets up a WiFi spot
called Starbucks, your computer/phone may
automatically connect. The hacker will be
connected to your computer/phone.
 In 2017 Google’s Project Zero security team
demonstrated a flaw in a very common wireless
chip by the Broadcom (used in phones by Apple,
Samsung and others) that leaves millions of
mobile phones and other devices vulnerable to
simple hacking by way of wireless networks.
 One of the discovered holes was a “stack buffer
overflow” hole that would allow an attacker to
“execute arbitrary code on the WiFi Chip.
 It has been mostly fixed, but there may be
others.
 One extremely worrying area is medical
device hacking; where hackers target devices
like insulin pumps, pacemakers and heart
implants.
 New Zeland computer security expert Barnaby
Jack showed vulnerabilities in each of these.
 Born: 22nd November 1977
 Died: 25th July 2013
 Born in Auckland, New
Zealand
 A New Zealand hacker,
programmer and computer
security expert.
 Demonstrated how to hack
ATMs (his technique was
called “Jackpotting”.
 He also show how to hack
various medical devices
 In 2012 his testimony led the
United States Food And Drug
Administration to change
regulations regarding
wireless medical devices.
 Hacking insulin pumps
 In October 2011 Jack demonstrated the
wireless hacking of insulin pumps.
Interfacing with the pumps with a high-
gain antenna, he obtained complete
control of the pumps without any prior
knowledge of their serial numbers, up to
being able to cause the demonstration
pump to repeatedly deliver its maximum
dose of 25 units until its entire reservoir
of 300 units was depleted, amounting to
many times a lethal dose if delivered to
a typical patient.
 Hacking pacemakers and heart
implants.
 In 2012-2013 Jack demonstrated the
wireless hacking of pacemakers and
heart implants.
 He developed software that allowed him
to remotely send an electric shock to
anyone wearing a pacemaker within a
50-foot radius.
 He also developed software to control of
heart implants.
 The risk to medical devices grows as more and
more become part of the internet of things (IoT),
in which physical devices are embedded with
technology to make them wirelessly accessible.
 According to a report from the US Department of
Health and Human Services' Office of the
Inspector General, the US Food and Drug
Administration is not doing enough to prevent
medical devices being hacked (November 1,
2018).
 Medical device company Abbott announced
a voluntary recall of 465,000 pacemakers
in 2017 due to a possible hacking threat.
The FDA said the devices contained
vulnerabilities that could allow access to a
patient’s device using commercially
available equipment. This access could be
used to modify programming commands to
the implanted pacemaker, which could
result in patient harm from rapid battery
depletion or administration of
inappropriate pacing.

More Related Content

What's hot

What's hot (20)

Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
malware analysis
malware  analysismalware  analysis
malware analysis
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
AWS for IoT
AWS for IoTAWS for IoT
AWS for IoT
 
Network security
Network securityNetwork security
Network security
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Intruders
IntrudersIntruders
Intruders
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 

Similar to Device Hacking

Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportROHIT SAGAR
 
Tao doc_acid
Tao doc_acidTao doc_acid
Tao doc_aciddocacid
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
 
Security threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesSecurity threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesIJNSA Journal
 
seminar Final ppt-format-1.pptx
seminar  Final ppt-format-1.pptxseminar  Final ppt-format-1.pptx
seminar Final ppt-format-1.pptxDarkDevil251247
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloJohn Intindolo
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IJNSA Journal
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
 
IEEE Wireless Communications • December 2018 531536-128418$2.docx
IEEE Wireless Communications • December 2018 531536-128418$2.docxIEEE Wireless Communications • December 2018 531536-128418$2.docx
IEEE Wireless Communications • December 2018 531536-128418$2.docxsheronlewthwaite
 
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...mordechaiguri
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
 
A Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless DomainA Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless Domainijtsrd
 

Similar to Device Hacking (20)

Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Tao doc_acid
Tao doc_acidTao doc_acid
Tao doc_acid
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
Security threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesSecurity threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devices
 
seminar Final ppt-format-1.pptx
seminar  Final ppt-format-1.pptxseminar  Final ppt-format-1.pptx
seminar Final ppt-format-1.pptx
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
IEEE Wireless Communications • December 2018 531536-128418$2.docx
IEEE Wireless Communications • December 2018 531536-128418$2.docxIEEE Wireless Communications • December 2018 531536-128418$2.docx
IEEE Wireless Communications • December 2018 531536-128418$2.docx
 
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Internet in news
Internet in newsInternet in news
Internet in news
 
A Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless DomainA Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless Domain
 

More from Damian T. Gordon

Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Damian T. Gordon
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to MicroservicesDamian T. Gordon
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingDamian T. Gordon
 
Evaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSEvaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSDamian T. Gordon
 
Evaluating Teaching: MERLOT
Evaluating Teaching: MERLOTEvaluating Teaching: MERLOT
Evaluating Teaching: MERLOTDamian T. Gordon
 
Evaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricEvaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricDamian T. Gordon
 
Designing Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDesigning Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDamian T. Gordon
 
Designing Teaching: ASSURE
Designing Teaching: ASSUREDesigning Teaching: ASSURE
Designing Teaching: ASSUREDamian T. Gordon
 
Designing Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDesigning Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDamian T. Gordon
 
Designing Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDesigning Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDamian T. Gordon
 
Designing Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDesigning Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDamian T. Gordon
 
Universally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsUniversally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsDamian T. Gordon
 

More from Damian T. Gordon (20)

Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
REST and RESTful Services
REST and RESTful ServicesREST and RESTful Services
REST and RESTful Services
 
Serverless Computing
Serverless ComputingServerless Computing
Serverless Computing
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
Containers and Docker
Containers and DockerContainers and Docker
Containers and Docker
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Introduction to ChatGPT
Introduction to ChatGPTIntroduction to ChatGPT
Introduction to ChatGPT
 
How to Argue Logically
How to Argue LogicallyHow to Argue Logically
How to Argue Logically
 
Evaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSEvaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONS
 
Evaluating Teaching: MERLOT
Evaluating Teaching: MERLOTEvaluating Teaching: MERLOT
Evaluating Teaching: MERLOT
 
Evaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricEvaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson Rubric
 
Evaluating Teaching: LORI
Evaluating Teaching: LORIEvaluating Teaching: LORI
Evaluating Teaching: LORI
 
Designing Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDesigning Teaching: Pause Procedure
Designing Teaching: Pause Procedure
 
Designing Teaching: ADDIE
Designing Teaching: ADDIEDesigning Teaching: ADDIE
Designing Teaching: ADDIE
 
Designing Teaching: ASSURE
Designing Teaching: ASSUREDesigning Teaching: ASSURE
Designing Teaching: ASSURE
 
Designing Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDesigning Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning Types
 
Designing Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDesigning Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of Instruction
 
Designing Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDesigning Teaching: Elaboration Theory
Designing Teaching: Elaboration Theory
 
Universally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsUniversally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some Considerations
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Device Hacking

  • 2.  Although it is difficult to exploit hardware, there is a lot of interest in device hacking as it gives so much more control over devices.  As the security of software becomes more robust, attackers are looking in other areas to control systems, and hardware and firmware are the new targets.
  • 3.
  • 4.  Newer smartphones and laptops use a USB port for charging (USB-C port).  The EU would like a common charger for all devices, and think USB-C is the way to go:
  • 5.  The problem is that the port can take data and instructions as well as power, therefore, if I create a fake charging station, I can steal all the data off a phone, install malware, or do anything else I want with the phone.  So experts have identified 29 different types of USB attacks, and recommend never to use public chargers.
  • 6.  Ran Yahalom of Ben-Gurion University showed the following kinds of USB attacks: ◦ Installation of infections, or other malicious software, that once connected, have access and take control of your computer or phone. ◦ Microcontrollers attacks, Microcontrollers (like an Arduino) can impersonate a USB peripheral and act like a keyboard or a mouse. Once you connect, it starts injecting key presses. ◦ Electrical attacks, creating an electrical component that looks like a flash drive, but conducts a power surge attack once connected, and, fry the entire computer or phone.
  • 7.  There are also some commercial USB hacking devices: ◦ USBdriveby ◦ KeySweeper ◦ BadUSB
  • 8.  USBdriveby: This USB stick is easily identified by the chain attached to it and contains a particularly nasty surprise inside. Once plugged into a PC, it begins to imitate your keyboard and uses keystrokes to disable firewalls, opens backdoors to allow remote control and tells network monitoring apps that everything is okay.
  • 9.  KeySweeper: Disguised as a USB wall charger, the KeySweeper hack is a very well concealed device which uses wireless connections to identify and spy on local Microsoft wireless keyboards. And, by monitoring keystrokes, KeySweeper can quickly obtain login details and transmit these back to a remote location.
  • 10.  BadUSB: A USB stick hack, BadUSB impersonates your keyboard to allow itself to reprogram firmware associated with your existing USB devices e.g. network cards can be reprogrammed to send users to sites containing malicious software which can soon infect your entire network.
  • 11.  Bluetooth is a wireless technology standard for exchanging data between fixed and mobile devices over short distances.  It used short-wavelength UHF radio waves in the industrial, scientific and medical radio bands, from 2.400 to 2.485 GHz.  Bluetooth is managed by the Bluetooth Special Interest Group (SIG),
  • 12.  BlueBorne is a generic term for several security vulnerabilities affecting electronic devices involving various Bluetooth implementations in Android, iOS, Linux and Windows.  BlueBorne scans for devices with Bluetooth enabled and once it finds them, can gain access in about 10 seconds. Once compromised, the device expands the reach of the attack, boosting the signal for the hacker and eliminating the need for the attack source to be within Bluetooth range of potential targets.
  • 13.  WiFi Spoofing  A spoofing attack is one where a program successfully masquerades another by falsifying credentials.  So if you login to a public WiFi regularly, e.g. Starbucks, then if a hacker sets up a WiFi spot called Starbucks, your computer/phone may automatically connect. The hacker will be connected to your computer/phone.
  • 14.  In 2017 Google’s Project Zero security team demonstrated a flaw in a very common wireless chip by the Broadcom (used in phones by Apple, Samsung and others) that leaves millions of mobile phones and other devices vulnerable to simple hacking by way of wireless networks.  One of the discovered holes was a “stack buffer overflow” hole that would allow an attacker to “execute arbitrary code on the WiFi Chip.  It has been mostly fixed, but there may be others.
  • 15.  One extremely worrying area is medical device hacking; where hackers target devices like insulin pumps, pacemakers and heart implants.  New Zeland computer security expert Barnaby Jack showed vulnerabilities in each of these.
  • 16.  Born: 22nd November 1977  Died: 25th July 2013  Born in Auckland, New Zealand  A New Zealand hacker, programmer and computer security expert.  Demonstrated how to hack ATMs (his technique was called “Jackpotting”.  He also show how to hack various medical devices  In 2012 his testimony led the United States Food And Drug Administration to change regulations regarding wireless medical devices.
  • 17.  Hacking insulin pumps  In October 2011 Jack demonstrated the wireless hacking of insulin pumps. Interfacing with the pumps with a high- gain antenna, he obtained complete control of the pumps without any prior knowledge of their serial numbers, up to being able to cause the demonstration pump to repeatedly deliver its maximum dose of 25 units until its entire reservoir of 300 units was depleted, amounting to many times a lethal dose if delivered to a typical patient.
  • 18.  Hacking pacemakers and heart implants.  In 2012-2013 Jack demonstrated the wireless hacking of pacemakers and heart implants.  He developed software that allowed him to remotely send an electric shock to anyone wearing a pacemaker within a 50-foot radius.  He also developed software to control of heart implants.
  • 19.  The risk to medical devices grows as more and more become part of the internet of things (IoT), in which physical devices are embedded with technology to make them wirelessly accessible.  According to a report from the US Department of Health and Human Services' Office of the Inspector General, the US Food and Drug Administration is not doing enough to prevent medical devices being hacked (November 1, 2018).
  • 20.  Medical device company Abbott announced a voluntary recall of 465,000 pacemakers in 2017 due to a possible hacking threat. The FDA said the devices contained vulnerabilities that could allow access to a patient’s device using commercially available equipment. This access could be used to modify programming commands to the implanted pacemaker, which could result in patient harm from rapid battery depletion or administration of inappropriate pacing.