USB Killer, Version 2.0 | Hacker Day

2021-12-13 16:07:52 By : Mr. Dvine Zhang

You can do many stupid things using ports on your computer. The best example is the Etherkiller, an RJ45 plug that connects directly to the power cord. Do not plug it into the router. USB is a bit tricky, but if there are enough capital letters, anyone can build a USB killer (.ru, Google Translatrix) that can blow up any computer

USB Killer v2.0 is the second version of [Dark Purple] this device. The first version is just a small board with a DC/DC converter, a few capacitors and a FET. When plugged into the computer, the converter will charge the capacitor to -110V, dump the voltage into the USB signal line, and then repeat the whole process until the computer crashes. The second version is slightly more refined, and now it directly dumps -220V to the USB signal line. Don't try this at home.

So, is the equipment easy to use? Clearly. To demonstrate in the video below, a bad Thinkpad X60 was destroyed by a USB killer. This laptop was originally purchased for testing purposes, but the monster that created the USB killer gradually attached itself to this compact laptop. There is a new motherboard on the road, and this laptop will be used again.

This is one of the things I really want to exist, but I think it is a terrible thing to put it there. Very cool technology and cute appearance!

Just out of curiosity, does anyone know what would happen if you were arrested by one of them and the police inserted it? Will they have legal consequences?

Edit: Also, does anyone see the schematic diagram of the device there? It's very simple, but it is a very cute fromfactor.

I'm sure that some of the accusations were enough to destroy police computers, but technically, it was *thinking* destroyed by the police. Legally speaking, do you need to agree to search? If you get consent and get consent, then technically speaking, you will destroy a police computer. This may be a space where no clear laws have been enacted, depending on the country.

I kind of remembered a story, a basket of USB flash drives with company logos dropped in the lobby of the company headquarters, and then when employees (and management) grab them, skip the three layers of physical security (they are free)) and Plug them into their computer (back to Microsoft Windows used to automatically run everything in Autorun.inf without prompting the user). Who is legally responsible for this attack vector? If someone abuses Microsoft COFEE, is Microsoft legally responsible for adding backdoors to each operating system they release?

I would "hope" (yes, I know, this may be far-fetched) police investigators will realize the possibility of malware on the USB memory stick and insert it into the unconnected "sacrifice lamb" to the network. I hope that PC is an old one, ready for surplus/recycling, and load Linux or Minix on it to ignore common M$ targeting malware.

In order to collect evidence, a write blocking device must be used to prove that the police did not tamper with it. Maybe the write blocking device has some protection for this... although I doubt it does.

This is the reason why this USB Killer is published on the Internet. Since law enforcement agencies now know that it is there, they know to be careful of it and place enough protection circuits between their computer and the target USB port (in this case, a pry with several Zener diodes and series fuses) The stick circuit can do this job just right).

The write interceptor may be damaged, but in my experience, unless you use a forensic tower with a built-in USB write interceptor, it is unlikely that the computer itself will also be damaged. Usually, the write blocker is independent hardware (sometimes with its own external power supply). You plug the USB into one end and plug the cable into your machine, and the write blocker plays a role in the box.

Write blocker looks almost at the price of a cheap laptop (and maybe more, once purchased through public sector brutality), so it still hurts the police.

They asked people if they had knives or needles during the search to prevent police from being injured. Not sure what will happen if you lie, but it seems appropriate. "Are you carrying any digital media that could damage the equipment used for investigation?" But if they write regulations for this, then someone must have designed a protected port to investigate suspicious equipment or other things.

I hope that some optical coupling can solve the problem and not even that expensive to implement. You may not be able to get USB 3.x throughput easily, but you don't need it for forensics purposes anyway. You can even build all of this into a single embedded cable for use on any USB host.

Simpler than that, I should imagine. Just some basic glass fuses that cut off at the voltage threshold on the data port-of course, lower than where the internal fuse of the port itself will try to cut off.

Even just a few current-limiting resistors may be more than enough. If they are designed to block the high-current direct current that may damage the USB port but let the AC signal pass, the USB killer will become harmless while still being able to use the flash drive.

The fuse has no effect on voltage, and neither does the current-limiting resistor. This is not a current problem, but a voltage problem. Of course, the resistance of the voltage drop is low, but the resistance of electronic products is quite high, especially the signal line. Well, it worked anyway.

As mentioned earlier, Zener diodes may be a solution, for example, the use of 7V voltage diodes can be slightly relieved. It is assumed that they can be turned off before the voltage causes any damage. That's the problem. You can design something that has a delay before connecting the data line, but the improved zapper can wait until it sees the data.

Since no one expects USB-zapper, no one will bother to guard against it. It may be cheaper to replace the motherboard only with a chance of one million to one. It's really just a trouble, hard disk data is still possible, maybe hard disk electronic equipment is also very good. There are a considerable number of transistors between the USB and SATA ports. It's not the kind of thing you can really model and test, it's too unpredictable. But it may not erase the data. It's always just an expensive annoyance.

The voltage itself does not cause any damage. It is the high current* caused by the voltage breakdown on the isolation layer on the chip that caused the damage.

Voltage multiplied by current represents power (energy per unit of time). If any of them is zero, no energy will be transferred to the "victim" circuit, so no damage will be caused.

Therefore, the best protection is to clamp the voltage (by using a Zener diode) and shunt the current through the series fuse, thereby breaking the circuit, which means that no current enters your victim circuit and will not cause damage.

"I don't know, unless you show me the schematic and source code of the device you are investigating." This actually depends on the degree of manufacturing of the survey equipment. If you have a new FTDI device driver on your USB flash drive, it may damage the police USB missile launcher...

Not when all hardware and software need to set up backdoors for government eavesdropping, the CALE Act is expanding (the Patriot Act does not help). Whether you like it or not, backdoors are required by law, and companies cannot disclose them under nondisclosure agreements, even if they are discovered by security researchers (like what happened with Apple). All this is stipulated in the law, but no one wants to really read them.

I assume from your comments that you have bothered to read this law. Can you tell us which one it is, and quote the point that requires all technology companies to install backdoors for their products?

Law Enforcement Communications Assistance Act of 1994 (CALEA)

In October 1994, Congress passed the promulgation of CALEA to take action to protect public safety and national security. The law further defines the existing statutory obligations of telecom operators to assist law enforcement agencies in performing electronic surveillance based on court orders or other legal authorizations. CALEA is codified in 47 USC § 1001-1021.

The first part of the House Report No. 103-827 provides the legislative history of CALEA.

https://askcalea.fbi.gov/calea/ https://www.fcc.gov/public-safety-and-homeland-security/policy-and-licensing-division/general/communications-assistance

And Cisco's RFP on lawful interception https://tools.ietf.org/html/rfc3924

http://cyberlaw.stanford.edu/blog/2016/02/calea-limits-all-writs-act-and-protects-security-apples-phones

Section 1002(b)(1) of CALEA stipulates: (1) The design of functions and system configuration. This sub-chapter does not authorize any law enforcement agency or office (a) to require any wired or electronic communication service provider, any telecommunications equipment manufacturer to adopt any specific equipment, facility, service, function or system configuration design, or any telecommunications support service provision business;

(b) Any wired or electronic communication service provider, any telecommunications equipment manufacturer or any telecommunications support service provider is prohibited from using any equipment, facilities, services or functions.

-So this means that a backdoor authorized by the government-is illegal under CALEA.

See also: https://www.law.cornell.edu/uscode/text/47/1002

(b) Restrictions (3) Encrypted telecom operators are not responsible for decrypting or ensuring that the government can decrypt any communication encrypted by users or customers, unless the encryption is provided by the operator and the operator has the necessary information to decrypt the communication.

You'd better encrypt the flash drive, and it is very likely that the police do not have the resources to do anything. At best, they just fish for crime. With this equipment, they now have conclusive evidence. They can increase six expenses.

It may not be a policeman. You may be a documentary filmmaker traveling through an unfriendly country. If you don't spit out the password, encryption may get you in jail. However, if their computer dies, then they may just wave your hand to let you pass, worrying about their lives.

In my opinion, now you really shouldn’t travel with something more offensive than Bach’s Brandenburg Concerto. In addition, if I really need to be smaller, please use a 64Gb SIM chip-small enough to hide, large enough to copy the largest state secrets.

The SIM card is the same as a mobile phone? Do they make SIM cards that store data? Why! ? You may get a K or so in the phone book area of ​​a normal SIM card. In order to hide data, there is steganography. Or just send it over the network, encrypt and hide it.

If you do not hand over your encrypted credentials when asked, many countries/regions will convict you for obstruction.

This is under the condition that you really *know* your credentials. This is a bit difficult when using "strong" security methods, such as a random password, which is only generated once per encrypted session (and is likely to be disclosed to the user only after verifying his/her security arrival).

If you have some documents that you need to take with you, just use the safe deposit box or post/courier. If the equipment you carry could damage the computer you plug in, then your costs will get worse. They are not like having only one computer. If it blows it up, they may observe or detain you more closely than usual. Crossing the border with things like this will make you be classified as a terrorist by both sides. They performed an X-ray scan of the thing, and you can see that it looks very different from a normal USB flash drive. More questions will lead to more suspicion, and then you know that you are detained. There is no duel process these days.

People who like things that ruin the perfect functioning for recreation do not understand that there are poor people out there who can afford it. Although this is a personal right, I think it is morally wrong and immature to promote it on HaD.

Do you really think that if the device you carry is either blank or only contains completely harmless and innocent data, no one will suspect you?

I would very much doubt people who look and sound too good to be true.

What? ? ? What if the device you are carrying is blank or contains only completely harmless and innocent data? Yes. I always bring a few blanks. Some have magazines or books and music on them. Frankly speaking, the security has never blinked twice. Everyone on this thread thinks they are smarter legal experts than the next poster.

Ha ha. TSA can't find their ass with both hands. Do you really think they can decipher electronic circuits? Mail/Express? ? ? Oh, the year is right.

Ha ha. TSA can't find their ass with both hands. Do you really think they can decipher electronic circuits? Mail/Express? ? ? Oh, the year is right.

-Sir, what's in the USB drive? - Oh…. I don't think you would want to go there and see...

I really want to see this happen

Yes...the police said: "Yes, yes!...I don't believe you. [Insert the drive] [Swish swish]...oh, fuck"-I told Pass you...

It depends on what you tell the police. If you tell the truth that he shouldn't plug it in, or it will damage the computer, then there is nothing to blame for you.

Jeroen apparently has not dealt with the police. Reasonability and logic, not how they work.

If you have made something that destroys the computer, why should you warn others? This is the sole purpose of this thing. Why do you want to warn people to bring it? In any case, there is not much reason to carry it, of course... this is a useless proof of concept, really.

It does exist. You can buy it on usbkill.com

Using a powered USB hub for testing is much cheaper than using a work computer.

And, if you are the kind of person who might expect the police to get into trouble, it would be a very interesting little thing to keep yourself by your side. Of course, it is important to tell them exactly what will happen if you plug it into the computer. Then be prepared to destroy how many computers before they realize you are telling the truth.

Bring your weight back to Reddit.

I store important files in it, but it only works on one of my computers. On other computers it will interfere with the USB mouse and sometimes put the screen into sleep mode. You may need to try some. Do you have any new computers with Windows 10?

In my opinion, the real opportunity is a USB "surge limiter". You can take a copy of this article with you and sell it to the police and others who want to plug a stranger's USB device into their computer. Doing so may make a few dollars ;-)

Are you a relative of Adrian Ramo? o_o

Capacitors do not have unlimited energy supply. Before the lid is fully discharged, one computer, up to two. Of course, you can always add a circuit that says "Exactly discharge 10ms and stop". This may result in Hyundai Cap being accused of killing more than two computers.

When you unplug the device, the cover does not store energy (you don't charge it first and then plug it in). It uses the 5V of the USB socket to charge and then discharge.

You seem to be really confused about how this device works. Capacitors are not charged like batteries for later use. They are charged by the computer they are about to destroy. You can use it on any powered computer until the capacitor wears out, which is a very high number given the reliability of modern capacitors.

I saw you did your homework. You don't know how it works?

I just waited until someone realized that this could be done on a larger scale, input 230V power and then release 50kV back to the grid. *Puff* Dozens of dead TVs, computers and other electronic products. When they catch you, they may go to jail.

It is not easy to use all these surge protectors. A good surge protector can prevent almost anything except a direct lightning strike. If you really want to do some real damage, let the device dump a very large current through the NG path for a period of time. (Some high-end socket testers deliberately do this to check ground integrity, but the time is too short to overheat anything.)

I am talking about experience. A lightning strike occurred within 50 yards of a technical building I managed. Every surge suppressor and UPS burned out. Not only did the surge stop, but each of the varistors exploded, melted, and burned. An APC UPS caught fire and burned a 1.5-inch hole on the motherboard. The varistor and splashed parts of the lid made the metal shell dent. I was completely surprised that it could still provide a regulated power supply for the load, but it was charged. The input is damaged.

Not a single protected device died. All unprotected equipment in each building within approximately 250-500 yards was destroyed. A decent surge suppressor can do wonders, but they are limited living parts.

What I want to point out is that the absolute energy in lightning is orders of magnitude higher than anything we produce artificially.

Not really. Only a few hundred megawatts. Most power plants do this day in and day out.

Graves is right. In watts, it is approximately terawatts. I know that no power plant will output that much "day in and day out". In fact, none of the existing power plants are close to it. AMS closed a few zeros. The total global demand is less than 20TW (about 16-18 unchanged). It is not something we have done to release so much energy in about 30 microseconds (on average). That being said, once you multiply a lot of energy by a very short time, it’s like ~8kwh

There is a Z-Pinch machine somewhere or elsewhere that can release quite a lot of energy.

My situation is just the opposite. Lightning strikes within 50 yards, and even equipment that was unplugged and installed in the transport box, were blown up by the electromagnetic pulse generated by the lightning.

In a client, when lightning strikes, the power cord merges with the APC UPS, but the switch and the computer protected by it survived (when the battery is exhausted, the computer can even shut down normally). We had to cut the power cord because the schuko plug could not pass through the hole where the UPS was located.

In my high school, all welders are grounded. An idiot will use someone else’s ground clip to solder, so that all current flows through the ground wire in the wall.

That school will be burnt down someday. Considering that we have generated an electric arc in the duct, the green wires are marked as hot, and the three-phase table saw connects the two-phase and neutral wires. There are irregularities everywhere. (The table saw also rotates backwards, which loosens the nut on the shaft fixed to the blade and the blade rubs against the side of the table)

Let me guess... Philadelphia School District?

It sounds like an idiot should be grounded, not just a welding tool.

Those nasty little "surge protectors" that are just a plug will not do anything, and then tens of volts of overvoltage MOV will "puff"... Proper surge protection requires multiple layers, and because it is very expensive (it Involving the modification of the house's power supply), many people have it.

As for the "power supply rodent killer"-it must be large, absolutely awkward, in order to release enough energy to cause any damage, all electrical appliances will cause a considerable burden.

ps A direct lightning strike can (and most likely will) tear the wire off the wall (Lorentz force)

The "Mains Zapper" has been completed. Unfortunately, before its designers were able to briefly introduce it to the Department of Energy and protect us from it nationwide, the Department of Homeland Security stepped in and classified the whole thing. Someone told me that one of the designers boarded the plane to give a briefing to the Congressional Energy Committee, and then stepped off the plane to find that none of the people in the energy department had the permission of the Department of Homeland Security to listen to their opinions.

It doesn't work like a USB killer, and since I know what the designer's PhD (to go to school with them) is, I can guess how it works; but it is a very small device. That, or my dear doctor pulled my leg after hitting the campus and drinking beer, because other things canceled the speech at the Congressional Committee.

Most electricians who have worked in substations have some ideas that kill them. Explosion-driven magnetic flux compression has been weaponized to destroy infrastructure. (Standard design, 50 years ago directly from los alamos, with waveguide, as simple as pi, assuming that one can use explosives fast enough (los alamos design is available online for free, rdx is much less. Considering that we have They have been installed on the missiles, and I believe that Wal-Mart in the United States will store them next to the uzis and flamethrowers in the children’s area any day.

Will not. The authorized person will not tell you anything. Why did he risk his permission to impress you? liar.

No one will tell you this. They will not take the risk of customs clearance and federal charges to impress you. You are a liar.

obtaniumtk: Which Wal-Mart sells usiz? I want one!

Okay, it took me a long time to come back and reply. The projects created by these people were not categorized when they started, it was just the get off work they did after work. I heard about it before the person I always knew set off for Congress, so it was listed as any security level before anything they raised. On their way to take off and head to Washington, the Department of Homeland Security came in to sort everything. Then I said that my friend drove a few hours back to our old campus. I am now a person in town. We drank a few beers and lamented that the Energy Subcommittee was not approved by the Department of Homeland Security because they decided what the equipment is now classified into. for.

I deliberately remain vague about who my friends in the project are, or how I think it works, because as far as I know, the Department of Homeland Security has done this for multiple projects. Although I know the sequence of events, and I only learned it during the "look at this cool thing we made" stage, who knows if the Department of Homeland Security will believe this.

If you have ever read the data sheets of MOVs, you will find that they will not handle steady-state overvoltages. They even turn on when the voltage is about 100V higher than the nominal value, and only process spikes within a few microseconds. In view of the very low impedance of power distribution, some people almost need a large capacitor bank to be charged to a very high voltage before a large spike can be generated. High-frequency content may be more likely to affect a small part of the local distribution. So it is unlikely to be practical.

So basically a solar farm?

It would be interesting to actually store the data on this thing. If the password of the file is not introduced, or it is better to have some code combination on the stick itself, please use it as a security measure. If the code is incorrect, it will kill your computer.

+1 After reading this article, I'm already working on it

I will buy one when you are done

I want to buy one too.

Register for me, and I want one too.

I am very interested in it.

We just started another HackaDay project in the spirit of Mooltipass! B^)

It sounds like Kickstarter to me!

Yes! I don’t have the technical expertise to carry out such activities, but someone with the ability should definitely initiate such activities.

I hope you don't make a typo.

Have half of the keys in the file on the device itself. This way, even if they have the password, they must have your device.

I also want to know what effect this has on mobile phones.

It is also good to have a small speaker play Rick Astley songs or other songs to irritate users.

You can also use it so that a password can be entered and a password can be destroyed. Anyone else just denies the data.

Very good idea. To be safe, let it destroy the data, not the PC.

This will take my encrypted Kali Live USB to the next level. Sign up for me too!

I might split the system into two drives and set it to blow up the system unless both drives are inserted at the same time (or within 10 seconds). I can see that there are several ways to do it; either use one stick as the lock/destroy drive and the other with data (if you insert the data drive without locking/destroying the drive, the data connection will not be established , So you can't read the data (or you can just burn the RAM, if you want more security), if the locked/destroyed drive is inserted by yourself, it will only blow up the system). If you put them on the lanyard, you may be able to solve the communication between the two drives via IR or RF or even just hardwired cables (although that would be more troublesome). Anyone who inspects drives usually only tests one at a time, so they won't consider trying them all at the same time first.

Of course, by allowing the user to agree to the "Terms of Use" pop-up window warning (hidden in other legal trash) may lead to abuse of the password prompt of this device, you can bypass the damage to the legality of the law enforcement technology, and the user bears all the consequences of its use responsibility. Or something that sounds equally mediocre. If the device itself warns them, you will not be charged.

Just put a label on the drive that says "Warning! Do not use! Damage!"

1. Check the mac address and destroy the unauthorized computer 2. One of the two passwords is decrypted, the other is triggered, and it is disclosed at will

Yes, but you can also make it deny access without a password. What's the point of breaking the computer? I think it might make sense to let it kill its own flash memory chip for safety's sake, if you can rely on it. It must not be long before the army will have a U disk with almost no explosives. Wouldn't put them in my pocket.

When I disassembled my old white macbook, each port of it is electrically isolated (the entire PCB part next to the plug is powered by a transformer, and each data is optically isolated), will this pass through the insulation barrier?

According to the article, this drives the voltage into the signal line. These (usually, see http://bit.ly/1PmPVaD) are not isolated due to the need to insert valuable things and are on the laptop directly as the motherboard.

The signal line should have ESD protection. The device destroys these protections by repeatedly dumping large amounts of power into it. After ESD protection, the USB signal line often directly enters a very important chip, which has a good connection with any other important chips including the CPU. The internal voltage of many of these chips is limited to 1V or less. The CPU also reacts to the piezoelectric gas igniter in an interesting way, with one or two turns of wire (to keep the spark gap in the loop circuit).

I went to check the motherboard again. I blame myself. The Ethernet and FireWire seem to be completely isolated, but the USB and screen ports are missing. There seems to be some serious filtering/protection, but it is definitely not an electrical clearance.

How about delaying 30/15 seconds before dumping the electrons?

I am shocked that people spend time inventing such things with only one destructive purpose. Some spoiled little bastards gave birth to his children on the street, and the parents of the children lost a dollar or two because of a stupid spat. Another part of me thought it would be interesting to watch the police plug it into his computer looking for evidence and not tell them anything. It is a USB plug and is not illegal to hold.

This is not new. I can't find the website, but there is one from the owner of an old video game store and repair shop that talks about rewiring an expensive game car at the time and leaving it on his counter. When they brought their SNES console for repair, he always knew who stole it.

That website is the act of Gord. He bought a defective game shark, blew up the expansion port of the PS1, and deliberately let it be stolen. http://www.actsofgord.com/Wrath/chapter03.php

Gold claimed that because of the stolen Gameshark, he hardly repaired it and eventually repaired 10 expansion ports. So does this mean that the person who stole it keeps taking it back to the store? Or do they share it with each other, knowing it breaks the port? The story has fatal flaws.

Should it be a novel, or a power fantasy of some nerd?

Wow, this is an urgent need for a password prompt before self-destruct. "The password is wrong. You have two more attempts"

Or just a small (phone) speaker and countdown from 10.

I wonder if it is possible to include a small lock that is difficult to actually remove. That will only increase the fun.

In this case, you can destroy the stick with a hammer.

This version does not need to be plugged in to run. http://i.huffpost.com/gen/1440349/images/n-SLEDGEHAMMER-large570.jpg

So, you didn't get it, eh. You found a friend who also didn't understand.

John Henry, is that you?

This gave me an evil idea. Make a few (dozens) people with cases, write "If you find, please call xxx-xx-xx-xx!" Put stickers on them, and put them in a random place. I want to know how many people will call after their computer breaks...

Or just write "Bob's Porn" on it and leave it in the cafe.

[Some popular female celebrity names] Sex tapes will be more effective. :)

"If you find this, please don't plug it in and dial xx-xxx-xxx"

It is best to use a prepaid phone#

It's best to give the number of your nemesis

How to use the collapsing magnetic field in the coil to generate a voltage of several kV?

I think the problem is that there is no ampere after the kV to cause the ESD diode to heat up. This voltage allows it to get rid of the smaller capacitance with a larger capacitance, and because there is no amperage after the "several kV", they are basically suppressed. By using a lower voltage, you can charge it and discharge more in quick succession.

So, can putting all thumb drives (with a properly locked computer/operating system combination) on the hub effectively prevent this kind of computer-damaging behavior? I guess these lines must go through the USB hub/switch chip, which may blow up before it reaches the computer.

Will a few Zener diodes connected correctly also help to alleviate this situation?

I want to see this test. I'm not sure that the hub is built to provide such functionality, I want to know if it can leak to the output. In theory, considering that some hubs provide deeper power pools, the hub may even take actions to strengthen operations.

Yes, it needs to be tested, but not just using one brand of hub, but using multiple hubs, because there are many designs.

Speaking of hubs, I once had a hub that blew up my equipment because of poorly-paid Asian workers who had poor soldering on it. Goodbye 100 yuan. So I know it can at least work in reverse:/

Common CMOS inputs have voltage clamping diodes connected to VCC and ground. Add a suitable resistor or resettable fuse according to the input, and you will get quite a bit of overvoltage protection.

It is very likely that many silicon wafers will have short-circuit failures in the case of (medium) overload. Medium = Will not explode immediately.

A few Zener diodes just cross the signal line, with a breakdown voltage of about 10V, plus a fuse in series, you can *easy* prevent this from happening. Once the voltage becomes high enough to generate a destructive current in the signal line, the Zener diode will short the signal line and the fuse will burst.

It will make the USB port (temporarily) useless, but will not cause any damage.

Have you ever implemented ESD protection for USB signal lines? Things are not that simple-they require low-capacitance solutions to avoid excessive interference with the signal. Few people want a built-in self-destructing component (fuse) to deal with this extremely unlikely situation, such as someone plugging in such a device.

I want to know if you can also use the onboard legal flash memory to create the same shape, and the surge will only activate when you enter the wrong password to decrypt (and blow up the flash memory at the same time).

I want to pack some of them in my luggage when I travel.

If necessary, it can be called a scramble, but I would love to chat with overly curious law enforcement officers who think they might peek without my consent. I really want to tell the judge that if they negotiate with me, I will be happy and warn them about the nature of the equipment at any time, but because they don’t have one, I can’t...

Or the stolen TSA agent or baggage porter.

If they trip over a landmine in your luggage, that is not a legal defense either. "Of course, Your Honor, if he can *ask* the mine well, he will survive..."

IBM thinkpad...no. They are as ugly as bricks, but very beautiful and strong.

Combine it with the real data storage and the password that must be entered to turn off the termination function. To make it crazier, add an extended locking function to fix it firmly on the port.

The password has been entered incorrectly for too many times, and the port has been filled with high pressure repeatedly. Cut off the power to the computer, it will dump any charge in the capacitor, which may blow up something. Failure to enter the correct password should also dump enough voltage on the memory chip to blow it up.

Use a hub to avoid this type of attack, just plug the USB cable into the hub. The hub will be toast, and the data on the terminating device will also be toast, but the computer will be saved.

Personally, I think the whole concept of locking (physical connection) to a computer just makes it look deliberate and malicious. It is much better to use a device that will destroy the computer after any amount of time. At that time, most people would think that there was a problem with the computer instead of suspecting the USB device. I would rather have a reasonable denial than be the first suspect in the crime.

I think it is more useful as a suicide device. Plug it into any standard USB and it will blow up the included memory. To access the flash memory, you might be able to put a piece of tape on the first half of the power cord that supplies power to the capacitor. Or an adapter for hidden non-standard pins.

So I want to know what is needed in the galvanic isolation of the USB port to make the host device have sufficient defense against this kind of attack?

There is something like ADUM4160 in it, are you safe? perhaps.

Yes, I think ADUM4160 can work. It should isolate up to 5KV. The reason why the built-in ESD protection of an ordinary notebook computer cannot prevent this situation may be because it releases more energy than ESD transients, and it can do so as long as it has electricity. ADUM may catch fire, but I don't think it will break the isolation.

What it really needs is a camera and microphone to record their reaction when plugged in...

Send reaction video with a 3G modem.

Even better, make an SD card version.

Another interesting variant is equivalent to the dye pack used in the cash transport box-indelible ink will be splashed when inserted. Impossible" stick-the speech synthesizer says "this stick will self-destruct" and then smokes and melts.

"Or a UV LED and some UV resin, so it sticks itself in the socket"

I like this idea. Without damaging the electronic device, you can propose to replace the USB port to further humiliate and/or anger your unfortunate victim.

I remembered the old cracked micro floppy disk with sandpaper. Does anyone remember that?

The one with the match head? I remember you would use this hack to set the computer on fire!

Ah, the pirate flag! This may mean that this is nonsense and no one has really tried it.

As far as I know, the pirate flag has not yet appeared.

Maybe I will not do one of them. Let's go back to the anvil shooting: D

My goodness. Why does HAD have such nonsense? ? ? It is not even creative, just stupid and stupid. Next, I will build a USB plug with a power connector. Or a USB flash drive with 20g explosive and a detonator connected to a USB power supply. The same lack of creativity and stupidity.

Here are some more stupid ideas for you: how to use a laptop PSU without a transformer, only some weight and a jumper from the power supply to the laptop connector. Or, if you insert it and put the CD above the HDD as the boot order, you can erase the boot CD without asking

What about the CPU that needs microcode update. Or a car with a wrong code and present in the emission test. Or a GPS/4G chip to monitor whether your heart pump rental/subscription has been paid.

Hmm, did I smell "Reposession Mambo" here? =)

Mr. Kudo kindly. Also. Almost human ep

Well, you sound very angry, and:

http://www.fiftythree.org/etherkiller/

Would it be easier to view 3-4 monolithic capacitors under the enclosure instead of running it on a computer? common sense. ..

The question is, for a basic IT worker, how obvious is it when looking at the motherboard?

How about the security-conscious reverse version-disable via software commands or similar commands. Therefore, if your laptop is seized and searched, it will kill all USB/LAN devices (etc.) that The Man plugs into it.

I believe that sending high voltage directly to PC or any device through the port to kill it is not a difficult task. It can be done with a capacitor or even a small Taser (Does that small portable USB belong to a Taser? If so, is it illegal to walk around with it?). In the accompanying blog post, you can see a great trick to blow up the entire network infrastructure behind the network switch (after the network switch is baked)! In this person's blog post, due to the high voltage, sparks would jump over burned connections instead of physically connected circuits. http://gfragkos.blogspot.co.uk/2015/09/a-weapon-for-mass-destruction-of.html

Just want to know... if you put a USB hub in the middle... the hub will be blown up... but what else? Will it affect any other devices (other peripheral devices or the computer to which it is connected)?

Jurgen, plugging a USB killer into a USB hub will only kill the hub. Not a computer.

I have never picked up any lost USB flash drives. Because of many reasons. This is one of them.

I want to see a version with some actual memory and a set of DIP switches to deactivate it ;-)

How do I create a USB Killer 2.0? Anyone please reply only if you know how to reply Thank you

V3.0 (patent pending) dumps 3.3KV directly to the USB, which is enough to not only damage the motherboard, but if the spike reaches the 5V line, it will spread through the machine like a virus and blow up the SSD/HDD. Not long ago I After testing this version on a machine, the battery itself heats up and may get out of control, but in any case it is more deadly than lamb.

I want to buy one!

I talked to people who sell this device on usbkill.com and they market it as a testing tool for hardware designers and penetration testers. I have watched the test video, and it was crazy, the expensive hardware was so easy to say goodbye. It seems that the new macbook will not be affected by those USB power surge attacks.

Please be kind and respectful to help make the comment section great. (Comment Policy)

This website uses Akismet to reduce spam. Learn how to handle your comment data.

By using our website and services, you explicitly agree to the placement of our performance, functionality and advertising cookies. Learn more