Analyzing USB Connections
-
Register
- Student - Free!
- Professional - Free!
Stealing business or military secrets is a thing which attracts a lot of resources from both attackers and defenders. Since Internet traffic is more or less covered by techniques, like DLP tools (or by just disconnected important machines from the Internet), the most popular way to steal confidential or sensitive data is by employing a USB device. During this presentation we will discuss artifacts left over plugging in USB devices to Windows, macOS and Linux computers or laptops, and how to extract and analyze them.
Yuri Gubanov
Belkasoft
Yuri Gubanov, Owner and CEO, Belkasoft, a global leader in digital forensics technology, known for their sound and comprehensive forensic tools. With a team of professionals in digital forensics, data recovery and reverse engineering, Belkasoft focuses on creating technologically advanced yet easy-to-use products for investigators and forensic experts to make their work easier, faster, and more effective.