PERKEMBANGAN SERANGAN TERHADAP WINDOWS DEFENDER UNTUK MENGAMBIL PENGOPERASIAN SISTEM TERINTEGRASI DENGAN HID BADUSB

Authors

  • Willy Napitupulu Universitas Indonesia
  • Muhammad Salman Department of Electrical Engineering, Faculty of Engineering, University of Indonesia

DOI:

https://doi.org/10.29303/abdiinsani.v11i2.1683

Keywords:

BadUSB, reverse shell, Linux, Programming, Python, Computer, Operation System, HID usb

Abstract

The Windows operating system is an operating system that is commonly used by many people. Universal Serial Bus (USB) is a mechanism used by many people with practical plug and play functionality, making data transfer fast and easy compared to other hardware. In its use, Windows has a weakness, namely that it is easy for users to experience exploitation of computers/laptops. There is a method called  that makes it possible for someone to plant a reverse shell backdoor and exploit files just by connecting a USB to the target computer without being noticed. This research aims to implement and analyze the impact of attacks carried out by BadUSB . Research was carried out to see whether planting a reverse shell backdoor and exploiting files on the target computer using BadUSB  could be done or not. The results obtained were that the backdoor reverse shell test using  which was carried out on the Windows operating system was successfully carried out.

Keywords: BadUSB, reverse shell, Linux, Programming, Python, Computer, Operation System, , HID usb.

 

Downloads

Download data is not yet available.

References

The Hacker Playbook: Practical Guide To Penetration Testing (March 13, 2014).

Black Hat Python: "Python Programming for Hackers and Pentesters," Justin Seitz (December 21, 2014.

"Pogue's Basics: Essential Tips and Shortcuts (That No One Bothers to Tell You) for Simplifying the Technology in Your Life", David Pogue (Dec 9, 2014).

Python Data Science Handbook", Jake VanderPlas (Nov 21, 2016).

Sam Grubb “How Cybersecurity Really Works: A Hands-On Guide for Total Beginners” (June 16, 2021).

"Hak5 USB Rubber Ducky Field Guide Book : A Guide To Keystrokes Injection Attacks", Hak5 (Jan 13, 2015).

"Bad USB MITM: A Network Attack Based on Physical Access and Its Practical Security Solutions", Jun Zhang, Laiali Almazaydeh, Ruoqi Wei, Peiqiao Wu (Nov 22, 2017).

BadUSB - On Accessories that Turn Evil by Karsten Nohl + Jakob Lell (Aug 11, 2019).

"Learn PowerShell Toolmaking in a Month of Lunches", Don Jones (December 25, 2012).

"Penetration Testing: A Hands-On Introduction to Hacking," Georgia Weidman (Jun 11, 2022).

"MODERN OPERATING SYSTEMS SECOND EDITION" by Andrew S. Tanenbaum Prentice Hall PTR ISBN 0-13-031358-0, 976 pages.

Security Research Labs (SRLabs). Turning USB peripherals into BadUSB. 2014.4https://srlabs.de/badusb/

BadUSB returns. Security Now! #476 - 10-07-14 Q&A #198, 2014

Harman, Richard. Controlling USB Flash Drive Controllers: Exposé of hidden features. Shmoocon, 2014.

Social-Engineer Toolkit v0.6.1 Teensy USB HID Attack Vector. TrustedSec, 2010

Published

2024-06-29

How to Cite

Napitupulu, W., & Salman, M. (2024). PERKEMBANGAN SERANGAN TERHADAP WINDOWS DEFENDER UNTUK MENGAMBIL PENGOPERASIAN SISTEM TERINTEGRASI DENGAN HID BADUSB. Jurnal Abdi Insani, 11(2), 2117–2128. https://doi.org/10.29303/abdiinsani.v11i2.1683

Issue

Section

section editor