Analyzing USB Connections

Stealing business or military secrets is a thing which attracts a lot of resources from both attackers and defenders. Since Internet traffic is more or less covered by techniques, like DLP tools (or by just disconnected important machines from the Internet), the most popular way to steal confidential or sensitive data is by employing a USB device.  During this presentation we will discuss artifacts left over plugging in USB devices to Windows, macOS and Linux computers or laptops, and how to extract and analyze them.

Yuri Gubanov

Belkasoft

Yuri Gubanov, Owner and CEO, Belkasoft, a global leader in digital forensics technology, known for their sound and comprehensive forensic tools. With a team of professionals in digital forensics, data recovery and reverse engineering, Belkasoft focuses on creating technologically advanced yet easy-to-use products for investigators and forensic experts to make their work easier, faster, and more effective.

Key:

Complete
Failed
Available
Locked
Analyzing USB Connections
Open to view video.
Open to view video. Stealing business or military secrets is a thing which attracts a lot of resources from both attackers and defenders. Since Internet traffic is more or less covered by techniques, like DLP tools (or by just disconnected important machines from the Internet), the most popular way to steal confidential or sensitive data is by employing a USB device. During this presentation we will discuss artifacts left over plugging in USB devices to Windows, macOS and Linux computers or laptops, and how to extract and analyze them.