TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Usbkill – anti-forensic tool to halt computer when new USB device is connected

385 pointsby berkas1almost 5 years ago

23 comments

waldfeealmost 5 years ago
If you are paranoid about something like this happening, just use <a href="https:&#x2F;&#x2F;www.qubes-os.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.qubes-os.org&#x2F;</a>. all usb devices are jailed in a non-networked vm by default.<p>In general, if what you do warrants that level of paranoia, qubes will help you massively.<p>Micah Lee held a great overview talk at HOPE 2018: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=f4U8YbXKwog" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=f4U8YbXKwog</a>
评论 #24070028 未加载
评论 #24070027 未加载
captainmuonalmost 5 years ago
Interesting project, I&#x27;m sure this is useful for people at risk.<p>Somewhat related, I&#x27;m wondering about the physical security of computers. There is an attack where they open your PC, take out the ram, and freeze it immediately so the bits don&#x27;t decay and they can extract your encryption keys.<p>All BIOSes have an option for cassis intrusion detection, but I&#x27;ve never seen a case that has the necessary cable. Has anybody here set up a chassis intrusion kill switch that erases the RAM&#x2F;shuts down the PC etc. if the case is opened improperly? Can you buy anything like this on the market?
评论 #24069843 未加载
评论 #24069732 未加载
评论 #24070799 未加载
评论 #24070657 未加载
评论 #24069926 未加载
评论 #24069725 未加载
评论 #24070768 未加载
评论 #24070170 未加载
评论 #24071390 未加载
评论 #24071453 未加载
评论 #24070804 未加载
raxxorraxalmost 5 years ago
&gt; In case the police or other thugs come busting in<p>I like this wording.<p>Disclaimer: Not a comment on current political happenings.<p>But seriously, the use case of disallowing USB sticks on devices is unnecessary hard to configure. Just an option to disallow certain device classes would be appreciated.
评论 #24070478 未加载
评论 #24070795 未加载
评论 #24070480 未加载
评论 #24070373 未加载
评论 #24070860 未加载
zelon88almost 5 years ago
I really like this concept.<p>That&#x27;s why I&#x27;ve made similar projects. One to detect when USB storage devices get attached to domain workstations, and email the administrator with device and user info..... <a href="https:&#x2F;&#x2F;github.com&#x2F;zelon88&#x2F;Workstation_USB_Monitor" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;zelon88&#x2F;Workstation_USB_Monitor</a><p>And one which detects USB HID devices, confirms them, and notifies the administrator..... <a href="https:&#x2F;&#x2F;github.com&#x2F;zelon88&#x2F;Rubber_Ducky_Defender" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;zelon88&#x2F;Rubber_Ducky_Defender</a>
sn_masteralmost 5 years ago
&quot;immediately terminates the connection&quot;<p>Reminds me of some old Firewalls that would actively poll active connections, and when one is made that violates their rules, &quot;immediately&quot; terminate it. Often times, an attacker can embed a lot in just a single URL in the query string (stolen passwords etc) that would be done in &lt; 5ms, faster than the firewall can act (if not even faster than the polling interval itself), specially if there is plenty of rules and active connections and&#x2F;or the machine is slow (e.g playing games).<p>That&#x27;s like choosing to not have a door on your house, because you know you can run fast and shoot the thief when they enter.<p>Maybe its not as bad for hardware due to the inherit latencies involved, but I am always skeptic about things that use polling vs sitting in the middle at the kernel before a USB connection is allowed to happen to the OS in the first place.<p>The default (aka the one that nobody will change) connection-polling interval for this thing is 250ms, which doesn&#x27;t seem too small for me for many conceivable attack scenarios.<p>For Mac, it runs this:<p>os.system(&quot;killall Finder ; killall loginwindow ; halt -q&quot;)<p>This won&#x27;t prevent windows from reopening after a reboot.<p>A possible exploit for this could be the USB pretending to be a keyboard, opening an exploit website or an app with malicious argument values, then you immediately shutdown the Mac, reboot manually and boom, the website&#x2F;app opens up and the machine gets owned anyway post-reboot!<p>Also, lack of Windows support is upsetting, considering there isn&#x27;t much code change required to do so.<p>The &quot;melt&quot; feature is one I really like and respect the thought they put to make it.
评论 #24072419 未加载
el_onialmost 5 years ago
I attended a talk by GSK and there was part of the talk about security. They don&#x27;t allow usb devices to be plugged into their analysis computers. But every year they get an intern that tries to charge their phone from the PC USB.<p>Something like this, that doesnt halt the computer but shows a warning on screen and logs information would perhaps be a solution to their problem. Although in the case of industrial espionage maybe locking the system would be worth it...
评论 #24070148 未加载
raziel2palmost 5 years ago
Seems like a lot of code for what should be, on Linux anyway, a simple udev rule?<p>echo &#x27;RUN+=&#x2F;root&#x2F;usb-changed.sh&#x27; &gt; &#x2F;etc&#x2F;udev&#x2F;rules.d&#x2F;usb-changed.rules<p>Then just put whatever you want to be ran in &#x2F;root&#x2F;usb-changed.sh.
评论 #24069754 未加载
reallymentalalmost 5 years ago
&quot;Tip: Additionally, you may use a cord to attach a USB key to your wrist. Then insert the key into your computer and start usbkill.&quot;<p>This line particularly caught my eye. I wonder what&#x27;s the percentage of people (I&#x27;m presuming people working in security or those who are trying to avoid detection) go to this extreme?<p>Is is even extreme?
评论 #24069673 未加载
评论 #24069657 未加载
评论 #24069655 未加载
评论 #24069700 未加载
pfundsteinalmost 5 years ago
In a similar vein, there&#x27;s antijiggler[1] which only locks the PC when a new device is connected.<p>[1] <a href="http:&#x2F;&#x2F;www.codefromthe70s.org&#x2F;antijiggler.aspx" rel="nofollow">http:&#x2F;&#x2F;www.codefromthe70s.org&#x2F;antijiggler.aspx</a>
brian_hermanalmost 5 years ago
I thought this was <a href="https:&#x2F;&#x2F;usbkill.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;usbkill.com&#x2F;</a> I think maybe this would be more effective in anti-forensic because it actually destroys the computer?
评论 #24070436 未加载
codethiefalmost 5 years ago
From going through the discussion I&#x27;m getting the impression that the only feasible attack vector provided by USB is by emulating a keyboard like a USB Rubber Ducky. Is this really the case?<p>For instance, if my laptop is locked (with a proper[0][1] lock screen like xscreensaver) and that lock screen is capturing all keyboard input and magic SysRq keys[2] are disabled, too, is there really no way an attacker could use a USB device to hack my laptop?<p>Similarly, if my laptop is <i>not</i> locked but comes with unusual key bindings (maybe even a different keyboard layout), what are the chances of me getting hacked with a USB device? (Let&#x27;s assume that the attacker manages to secretly plug in said USB device but doesn&#x27;t want to access my unlocked laptop directly – maybe because we&#x27;re in an open office and people are watching.)<p>My impression had always been that USB devices are dangerous beyond simple keyboard emulation but I might be wrong.<p>[0] <a href="https:&#x2F;&#x2F;www.jwz.org&#x2F;blog&#x2F;2015&#x2F;04&#x2F;i-told-you-so-again&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.jwz.org&#x2F;blog&#x2F;2015&#x2F;04&#x2F;i-told-you-so-again&#x2F;</a><p>[1] <a href="https:&#x2F;&#x2F;www.jwz.org&#x2F;xscreensaver&#x2F;toolkits.html" rel="nofollow">https:&#x2F;&#x2F;www.jwz.org&#x2F;xscreensaver&#x2F;toolkits.html</a><p>[2] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Magic_SysRq_key" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Magic_SysRq_key</a>
评论 #24072412 未加载
评论 #24074652 未加载
jokoonalmost 5 years ago
I dont understand. Is USB just always insecure because of hardware?
评论 #24069761 未加载
Ericson2314almost 5 years ago
And now, we&#x27;ve come full circle to plug-and-stop-playing.
0xdeadb00falmost 5 years ago
A hotplugd script can be used to mimic this on OpenBSD
bra4youalmost 5 years ago
I saw this solved with a USB stick on a keychain and the computer shuts down when the stick is removed. Does anybody still have the link?<p>Ah. Found it: <a href="https:&#x2F;&#x2F;tech.michaelaltfield.net&#x2F;2020&#x2F;01&#x2F;02&#x2F;buskill-laptop-kill-cord-dead-man-switch&#x2F;" rel="nofollow">https:&#x2F;&#x2F;tech.michaelaltfield.net&#x2F;2020&#x2F;01&#x2F;02&#x2F;buskill-laptop-k...</a>
Benmcdonald__almost 5 years ago
How does this work for usb typec? When I plug in my power cable will my computer shutdown?
评论 #24072924 未加载
评论 #24073234 未加载
stjohnswartsalmost 5 years ago
Everyone should also install a hard power off on the front of their computer and always have encrypted drives. Unrecognized USB storage in my computer also is instant off. Might corrupt my files someday, but it&#x27;s worth the risk.
atum47almost 5 years ago
I&#x27;ve made a video about disabling the USB to prevent rubber ducky attacks a long time ago.<p>never thought about shutting down the computer.<p><a href="https:&#x2F;&#x2F;youtu.be&#x2F;RtRsBTGZUgc" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;RtRsBTGZUgc</a>
nialv7almost 5 years ago
What&#x27;s stopping the forensic people from just spoofing the USB device IDs?
评论 #24072610 未加载
评论 #24073320 未加载
gamblor956almost 5 years ago
Destroying evidence is considered a crime on it&#x27;s own. Use something like this at your own legal risk, since it&#x27;s usually far easier to prove obstruction than it is to prove the underlying crimes that were being investigated.
评论 #24076371 未加载
M5x7wI3CmbEem10almost 5 years ago
does encryption offer any benefit if you’re using a cloud syncing solution?
lizardmancanalmost 5 years ago
not as easy but more fun to ruin the usb device.<p>if they use mousewiggling the screensaver could use other triggers&#x2F;patterns to keep the box on. say 1 google search per 15 min minimum. randomly moving the mouse seems a good reason to shut down.
numlock86almost 5 years ago
Obligatory $5 wrench comment: <a href="https:&#x2F;&#x2F;xkcd.com&#x2F;538&#x2F;" rel="nofollow">https:&#x2F;&#x2F;xkcd.com&#x2F;538&#x2F;</a><p>Something like this is probably good when you - as a person - are not around when your hardware gets extracted from your place. But then again, why would it be running openly and unattended in the first place?
评论 #24070448 未加载
评论 #24070008 未加载
评论 #24070091 未加载