NSA Playset: USB Tools presented at Shmoocon 2015

by Michael Ossmann, Dominic Spill, Jared Boone,

Summary : USB implants were among the most talked about gadgets in the NSA ANT catalog after it leaked last year. Concealed in cables and connectors, these devices appear to be designed primarily to provide covert communication channels to malware operating on a host computer. Secondarily it seems that they could be used to implement USB attacks or to monitor connected USB devices.
We'll demonstrate tools we've built for the same capabilities. This will be the first public demonstration of USB man-in-the-middle with Daisho, our SuperSpeed USB platform for wired communication security research. Additionally we will show capabilities recently added to USBProxy, a software framework that can operate on hardware platforms such as BeagleBone Black. Just for fun, we'll also play with TURNIPSCHOOL, our own RF implant hidden in a USB cable.
Dominic Spill has been building Bluetooth packet sniffers since 2007; he now works on Ubertooth and USBProxy among other communications sniffing projects.

Michael Ossmann: Michael Ossmann is a wireless security researcher who has been obsessed with Bluetooth for much of the past three years. He founded Great Scott Gadgets in an effort to put new tools into the hands of smart people.