DEFCON 20: Bypassing Endpoint Security for $20 or Less

DEFCON 20: Bypassing Endpoint Security for $20 or Less


Speaker: PHIL POLSTRA COMPUTER SECURITY PROFESSOR, UNIVERSITY OF DUBUQUE

In this talk cheap easily constructed devices which can be used to bypass endpoint security software by making any USB mass storage (flash or hard) drive appear as authorized devices will be presented.

The design and implementation will be discussed in detail. Devices can be constructed for approximately $18 and $30 for a small package which requires soldering of 4 wires, and a slightly larger package which requires no soldering, respectively. Some familiarity with microcontrollers and C programming would be helpful, but not required for attendees to get the most from this talk.

Phil Polstra was born at an early age. He cleaned out his savings at age 8 in order to buy a TI99-4A computer for the sum of $450.

Two years later he learned 6502 assembly and has been hacking computers and electronics ever since. Phil currently works as a professor at a private Midwestern university. He teaches computer security and forensics.

His current research focus involves use of microcontrollers and small embedded computers for forensics and pentesting. Prior to entering academia, Phil held several high level positions at well-known US companies. He holds a couple of the usual certs one might expect for someone in his position. Phil is also an accomplished aviator with several thousand hours of flight time. He holds 12 ratings including instructor, commerical pilot, mechanic, inspector, and avionics tech. When not working, he likes to spend time with his family, fly, hack electronics, and has been known to build airplanes.

Over the last few years Phil has spoken on various USB-related topics at a number of conferences such as 44Con, NetSecure, MakerFaire Detroit, and Black Hat. He has developed a number of cheap, fun, and useful devices for infosec and forensics professionals.
Twitter: @ppolstra
Facebook: ppolstra
http://ppolstra.blogspot.com

For more information visit: http://bit.ly/defcon20_information
To download the video visit: http://bit.ly/defcon20_videos
Playlist DEFCON 20: http://bit.ly/defcon20_playlist
Closed Caption:

you guys having a good day all right
well hopefully hopefully you're in the
right place
all you know of one of the things that I
do I for a living I teach at a
university and you know when you ever
you go to school the first day of school
the biggest question everyone's mind is
too i go to the right classroom but
thankfully we have nice big projectors
so if you're not here to learn about
endpoint security and USB impersonation
of go somewhere else
unless you're probably all really just
here anyway because the other tracks you
really wanted to go to her full but
that's okay that's okay I can live with
that
alright so let's get started
just a little bit of a road map out why
this talk
who is this handsome guy up here a
little bit of a brief history USB has
USB work
we'll talk about descriptors and end
points in USB then we'll delve into mass
storage devices
how do they work and then we'll talk
about the good stuff
how do you bypass endpoint security
anyway talk about some microcontrollers
devices that you can build for twenty
bucks or lasts as advertised and a
little bit about some future directions
that you might do right
so why this talk anyway well there are
some organizations that are starting to
use endpoint security programs and order
to restrict portable media you know
they're tired of everybody just bringing
in their stuff and you know sucking
things off of their networks
you know in the movies what happens
right someone is stolen all the secrets
onto a flash drive and surprisingly
nobody notices until after they've left
the building you ever notice that
there's an alarm
oh wait he just left darn it alright so
a lot of software out there exists it's
starting to come into the market that
does the equivalent
of mac filtering but for USB and if you
know anything about Wi-Fi you know Mac
filtering doesn't work
so basically what do they do they have
device they have software it says are
you on my good list
are you my white list your vendor ID and
product ID and if you're not well guess
what
I'll show you how you can build
something for cheap that makes your
device
look like it's on that list and why
would you want to do that
two reasons you want to inject something
and you want to extract something
so who is this handsome guy
I teach security at a small private
university in Iowa
I like to hack hardware I've been known
to fly and build airplanes and do other
fun stuff and last couple years I've
been known to play with USB devices
alright so USB something's been around
for quite a while
96 they release the first back and then
they quickly updated a couple years
later back in the olden days they had
1.5 and 12 megabit speeds 1.5 was called
low speed and then 12 is called full
speed and then two thousand they came
out with a new spec and they added
high-speed 480 megabits per second then
they kind of took a break for a bit and
they came out with USB 3
we're starting to see some USB 3 devices
now that are really getting out there
and they claim speeds of up to five
gigabits per second is kind of like my
cable cable modem internet ya up to 15
megabits per second
why is it I always get three alright so
how does this stuff work anyway
well it's made to be very simple simple
from a user standpoint
so they have some nice idiot-proof
hardware
it's a pretty simple for wire protocol
and it's set up so that you cannot screw
it up unless you try
right so you know if you're used to
going old-school cereal you know that
you can very easily hook something up
wrong and you're like oh that's the
wrong kind of rs-232 cable or always got
the 25 pin I needed the nine and oh it's
not an old modem cable and they got
little rid of all that hassle also made
it hot pluggable and they use
differential voltages which is good for
noise and things like that on your lines
and you can have some fairly long USB
cables as much as 16 feet
there's some software involved
there's automatic configuration there's
no jumpers or anything like that that
you need to use is a process called
enumeration we're basically goes to the
device and says tell me about yourself
and within the standard we have some
standard classes for our devices so we
have human interface devices printers
audio devices and then for today we want
to talk about mass storage devices
so how does this work
well it's a tabs 12-step process now of
course I I have some friends in the
media and they tell me that all hackers
are intimately familiar with 12 step
programs
all right so you know what happens you
connect the device in the hall detects
that in the host which is usually a
piece C says hey it's informed there's
new device and then it starts talking to
it says what are your speeds what your
capabilities and it resets it gives it
an address etc etc etc right so it all
comes down to descriptors and end points
so an endpoint is really a virtual wire
or a pipe if you will
it's a unidirectional virtual pipe right
and by the way the endpoints have a
direction and the direction is measured
relative to the host
so sometimes things might seem a little
backwards when you're dealing with USB
you might think but wait i'm sending
stuff out
no you're sending it stuff in to the
host out
fortunately a lot of the things like
pac-man fragmentation handshaking and
all that is done in hardware
you can get specialized controller chips
to do this and the address for each end
. has a meaning the HIBE it tells you
whether it's in or out and their various
types of endpoints control end points or
something that every device has to have
you can have bulk in points which we'll
talk about a bit today interrupt
endpoints and also I so Prentiss and
points
alright so called control and points
most devices use this to communicate
with the host and every device has to
have at least one we call it end . 0na
10.10 program and basic and the devices
must respond to standard request so
these data requests are things like hey
get set your address
give me descriptors change your power
settings and what's your status anyway
some of you may have gotten status input
from yah your badges anybody
how many of you of
the hook those up to us be a really
that's all
ok just a little hint i'll talk to you
tell you status
alright so the devices can also respond
to specific class requests for the class
of device and optionally vendor request
so you can could in theory have a very
special driver for your kind of mass
storage device in practicality
nobody does that because nobody wants to
rewrite the drivers
all right all right ctrl + points you
get three stages in the control and .
transfer you have a set up stage a let's
talk maybe a datastage depending on the
kind of communication and then a status
alright so the status stage
you just send it a zero linkback it back
that says ACK
yeah we're all good interrupt I so
synchronous don't really want to talk
about him but just so you know what they
are
interrupts for infrequent communications
things like miles keyboard stuff like
that
I synchronous is good for streaming
media etc all right
Vulcan points the good stuff
Balkans points are used for mass storage
devices they don't have any guarantees
on latency but if their buses idol which
it usually is
you have some pretty good performance it
however if there are other kinds of
transports on your buzz it gets
superseded by anything else of if you're
doing full speed communications you know
that whopping 12 megabits per second
you're allowed 8 64 byte packets and
keep that number in mind for later it
will be relevant if you're doing
high-speed transfers
you can use 512 byte packets
and this is used pretty extensively and
that flash drives also external hard
drives
so the transits transactions consists of
a token packet and then some data
possibly and then you send it back at
the end
so what's a descriptor
while the write the script or the
scribes describe things they all have a
standard format the first bite says this
is how big this descriptor is in other
words hardware on the other side this is
when you should stop reading information
right
this is when we're done the second bite
is what kind of descriptor was this
thing anyway
and the rest of it is the actual
descriptor some common types of
descriptors a device descriptor is
what's gotten first and it tells you
basic stuff like hey how can I talk to
this device
what sort of power requirements does it
need things like that
configurations I'm sorry configuration
tells you how much power up
how many interfaces does it have huh you
know how do I talk to it except for
seven interface then goes on to further
described the bot device and then we
have end . descriptors which tell us
about each of the end points and then
string descriptors which just give us
strength and unicode
alright so device descriptor
what does it send you first thing is
going to send you the length and then
the descriptor type in this case it's
descriptor type 1 USB and vcd it's going
to send 200 and hex and then it's going
to send you a couple of important pieces
of information namely the class subclass
and protocol right now in the spec in
the u.s. bag you can send zeros which
means oh well I'm not going to tell you
get I will tell you in a ladder
lower down descriptor
all right so I'm not going to tell you
in the device descriptor
maybe i'll tell you in the configuration
descriptor for the interface descriptor
right and you know other things like
packet sizes and then we have a
manufacturer ID and a product ID in some
cases a serial number that has to be
filled out
so this configuration descriptor is got
next
and again it starts with the length and
then at the type its type to the real
creative right one to Center and it
gives you some information
the last bit that it gives you is the
maximum power right now if you're going
to make a little device say something
kinda like this little preview that is
going to fake another device
obviously I have some electronics that
are going to require a little bit of
power of their own
in addition to whatever my thumb drive
takes some people might be tempted to
just crank up the power
don't do that all right the problem with
that is if you crank up the power and
your port cannot provide that much power
it will enumerate your device
alright so usually a hundred milliamps
is pretty safe and it's probably enough
anyway
all right so don't don't get lazy and
get all gung-ho and like I think I need
a watt of power in our five watts of
power here now
don't don't do that all right just a
little tip all right then we get an
interface descriptor and again in the
interface descriptor we can have the
class of class and protocol if we had
zeros in the earlier descriptors then we
eventually do have to say that this is
what kind of device this is and then we
have to describe our end points on the
case of a mass storage device is i'll
say in a little bit
you're going to have at least three
endpoints control and . ball can bulk
out
and each of those endpoints has an
address and remember that the high-order
bit tells you the direction and then it
has an attribute that field as well in
the attribute bit field will tell you
things like is this a bulk and .
another thing you should keep in mind
you know all the stuff you can get us be
that org etc of a lot of these bits are
reserved
if they're not zero things tend to crash
on you
alright so just throw out stuff if it's
not specified right and then we have
string descriptors string descriptors
give you unicode text again the first
thing it's going to give you is the
length then it's going to give you the
type its type 3 the string descriptor
and then it's going to give you a
unicode string which for most of us here
is pretty much asking text for every
other character every other bite it's
just 0
there is a special case and the special
case is string descriptor 0 string
descriptor 0 says what languages do you
speak please write and here is proof
that the u.s.a has fixed and improved
the English language that we got the
bridge because even devices you get from
the UK report speaking us english which
is by the way hex code 409 is that
formula 409 home cleaning up the
language
I don't know alright so now that we've
learned a little bit about general
devices and such without further delay
let's talk a little bit about bulk only
mass storage devices and how does this
stuff work right so we're talking about
flash drives primarily you know what
kind of hardware do they have software
filesystems how to talk to him
things like that up here is a picture i
shamelessly pulled off of Wikipedia
all right out of a flash drive so you
can see the different components
you know you see things such as a big
nand flash chip a little controller chip
etc
by the way the little silver can you
probably know this from looking at your
badges for the conference here is a
crystal oscillator
but some of the newer drives by the way
I have taken apart a few of these and
some of the new ones they come in this
big case you have this big case you're
looking at it and you're thinking okay
that it probably looks like this inside
I mean after all
we'll get this picture off of Wikipedia
and it's never wrong
so sometimes you will actually pull one
of these apart and you'll find out that
it's a big empty case and they have one
integrated circuit
it's really integrated it's the little
spacer in the USB connector
it's literally a chip that's got the
four leads built onto it and you either
like really I had this thing that was in
a couple inches long
there was absolutely nothing inside of
it and even had a little sliding case
and everything but just fri now
so typically these thumb drives using
NAND flash storage you get about 10,000
write cycles on these if you're writing
to them in particular you don't get
anywhere close to that 480 megabits per
second by the way again it's like the
cable modem up to this but not even
close
you can only write to it blocks typical
block sizes are 512 lights
you can have other larger block sizes
although honestly I have a whole stack
of these know my desk at home and
haven't seen a single one of them with
these large plots
maybe I just don't buy the right drives
but i guess i like the cheap ones
maybe that's what it is but calm and you
can you can have some forensic fun with
those as well
so how does this work
these flash drives present themselves as
a scuzzy device so they really look like
a scuzzy hard drive to your computer
and you have typically 512 bytes sectors
and they use the scuzzy control set
most of these devices are pre-formatted
as one partition
but we don't competitions for flash
drives a column logical units and call
them
lunds logical unit numbers up by the way
here's a little tip I have found that
some versions of windows do not see
other than the first logical unit
so if you want to hide something on a
thumb drive
put it on other than the first partition
and don't use a windows compatible file
system
all right that'd be another good way
sometimes the reported sizes don't match
the actual sizes of you know you can use
that to hide some information
a few years ago there was a a big batch
of cheap Chinese thumb drives that will
count went out in the market i see some
head shake did you buy one of those now
okay
but . and what they did is they over
advertise
they said hey this is a four gig drive
and it was really only two and they
figured by the time you filled it up
past the tube then it would just start
generating errors and be like well I'm
long gone by then
it's like buying something in the you
know in the flea market
well sorry it wasn't a real Rolex but
other things to keep in mind typically h
512 byte block need 16 bytes for error
correction
so you might wonder why is the software
why is the size not exactly what is
reported to be not software usually
implemented in the controller chip has
to detect communications respond to
requests check for errors manage power
things like that
what kind of file systems can you put on
these things well it's a block device
whatever you want
well most of the time they come pre
formatted as fat32 for external hard
drives I've seen those pre formatted
ntfs or for a thumb drive if you want to
you can put the true
flash file system the extreme flash
palace system the journaling flash file
system or my personal favorite favorite
yet another flash file system
it kinda like camel up again if you want
to maybe potentially hide some
information from windows users a higher
order one with a non-windows IE linux
only file system can work really well
alright so how do you talk to this flash
drive anyway you have this bulk only
mass storage protocols sometimes it's
called BB because it's all bulk and
unlike many devices instead of using the
control endpoints you use the Balkan
points and there are three phrases
there's a command block rapper phase
where you send a command block in a
wrapper data transport depending on the
community and then a command status
rapper we say hey to this succeed or not
alright so mostly strives use that
reduce Ozzy instruction set and you know
if you have to send and receive data you
use a bulkhead . for that
so what does this look like here's a
little see structure for a command block
rapper
it starts with a signature the signature
is really creative
incidentally kind of a funny story i was
reading a book on USB stuff
a couple years ago and they just hadn't
hacks here is this code and I'm looking
at it and they actually had it reversed
and I'm like wow that's just
another obscure well if you look at it
types us b/c for USB command it's not so
obscure but and then there's a tag that
dissociates you know the packet it's
like a sequence number for tcp IP and
you know how long is it going to be
and some flags etc and then finally a
command black rapper you have 16 bytes
in this wrapper and real commands are
going to use 6 to 16 of those
so for example if I wanted to format a
unit
I'm going to have a command block looks
kinda like this
the first bite is always going to be a
command code again
what am I supposed to do I have to know
what the command is to know how much
more i should really be looking at
anyway
what's the logical unit number etcetera
etcetera
another example if I want to do a read
there are different formats for read and
write this one is called read 10 and
it's based on how long the command block
is all right so what are some common
scuzzy commands format units is a good
one because you can in one atomic
operation just format the unit and erase
it
inquiry how's it going mode select mode
sense
read read format capacity rica pacity
all those other things right command
status rapper comes at the end so you
send a command block something happens
maybe some data is transferred and at
the end you send a command status rapper
and looks kinda like this and again real
creative USB s4 status
by the way if you're cheap and you want
to view all this lovely USB traffic and
you have a linux machine if you don't
know this you can use USB mod so if you
just do a mod probe USB mon and you fire
up wireshark guess what all of a sudden
you have a bunch of USB buses available
for you to trace the stuff on comes in
handy
of course hardware USB tracer would be
nicer but they're a little bit more
expensive than free
all right enough of this background
stuff let's talk about the good stuff
how do i value pass this security any
anyway so essentially what we're doing
is impersonation or social engineering
us be stopped
you will all right so if we know what an
authorized that pit is uh we can use
that fact to mount the device and then
inject some code get some stuff off of
our device are also the device that I
design optionally allows you to do some
right blocking so we'll use some
microcontrollers because they're fun and
they're cheap
so you know when you're going to use
micro controller you can look at the
different possibilities and say which
one show you labr is pretty popular it's
using the arduino family a lot of code
out there unfortunately doesn't do us be
very well
even the you series chips that yeah you
don't need the FTD
I chip anymore but they don't do mass
storage they will do hit stuff but they
don't do the mass storage stuff
same thing is true with the pic family a
lot of people like them I like them
they're fine up but just not good for
this purpose so though the winner is
neither of those couple years ago ftdi
you know the people who make those
little USB interface chips came up with
a microcontroller of their own
maybe they got tired of just making that
interface chips
it's a little faster forty eight
megahertz and uh
unlike the Arduinos it has sort of a
proper real-time operating systems got
threads semaphores and cool stuff like
that and more importantly USB classes
so how does this work these thinking two
chips allow for two full speed USB 2.0
interfaces which can be host or slave
interfaces the chip also has a whopping
256k a flash memory which if you don't
do microcontrollers doesn't sound like a
lot and if you do it does
16k Ram and normal microcontroller kind
of stuff they have several development
modules available which is a good thing
because they only provide their chips
and surface mount technology so it can
be a real pain in the butt for
prototyping things like that
they also have their yet another arduino
clone make all the pinko
let's get the arduino formats sort of
the next to roll pins that you can use
so they come in the surface mount of
packages you know here's a basic diagram
of the block diagram of the chip which
i'm sure you guys can't read anyway it's
in the slides
it does have it a fairly decent ID it's
not eclipse or anything like that but it
gets the job done
it has some debugging facilities and and
such so it does it does work and in
there
they do have this nice ability where you
can pull up the chip that you're going
to target and you can point and click
and say this pit is going to do this and
this pin is going to do that right
I in again one other difference between
the AVR series say
and these ftdi chips is that in the AVR
is when you go from one size chip to the
next
it changes the amount of ram and flash
we're here it's consistent so the only
thing that changes if i go from a 32 pin
to a 64 pin
is the amount of i/o pins I have
available to me so that that can be nice
and useful you can develop something and
then you can scale it up and down is
required
all right ok so what's the small package
look like you know if I just want
something tiny I can get something i'm
sure you guys can't see this so well but
looks about like this
all right so it's a little 32 pin
development board and I only have four
pins to solder i can sacrifice an old
USB printer cable soldered on there and
the disclaimer only four pins the solder
if you're not fond of things like LCD
displays and blinky lights and stuff
like that
ok but so if you want to add that stuff
then
ok maybe do have to solder a little bit
more if you're really not in the
soldering you could use one of those
arduino clones like this
bingo board shown here and now you don't
have to solder on a cable because it's
got a hose and slave port built into it
again same disclaimer
alright so how does this microcontroller
based impersonator work anyway
what it does is it allows you to insert
your your flash drive and then
enumerates it and then when the pc when
you plug this device in the pc it says
out
I say there's any device let me
enumerate it and it tries to get an
authorized bid pit combination if it's
not successful
it tries the next one alright so there
are two basic modes of operation in the
device you can either say all I know
what the big pit is and I'll just set it
or you can try automatic mode so
automatic mode i have 500 of the most
common that pit combinations and it will
just scan through those so high level
design it's a multi-threaded app you
know get apps to say hey let's talk to
this thumb drive another thread that
talks to your computer
some management thread
and things like that also there's a
timer thread and what's the what the
timer thread does is if you're in the
automatic mode whenever the pc asks for
device descriptor says also was trying
to talk to me and it starts a timer
if they stop talking to you after a
second and they don't ask for additional
descriptors it says all someone's
blocking I'll go to the next one and
that's how that works and there's also a
thread for reading the buttons
they come in all right so main thread
sits around and waits for packets to
come in
uh if it's a white listed command it
forwards it on Ford's on things like
command block rappers performs the data
transport phase
does little man in the middle action and
does the csw passing all right if you're
right blocking if there are non-white
listed commands it just says hey
yeah I got your command and then it does
any sort of data transport phase and it
says you're good
it worked right now initially an early
design of this
I actually returned a unsupported
command status if you try to do things
like format my drive or right to it and
what i found is strangely enough
windows does not handle it correctly
so you tell windows unsupported command
what do you think windows does tries
again and again and again and it never
gives up
right it's really obnoxious so all right
so the main loop
you know to sit around waiting for stuff
and then i have a bunch of handlers
so this is just a quick example for the
inquiry command it gets a command block
rapper allocates a little space for that
device gets a response
send it back
and waits for a command status rapper
sends it back
you know it's not rocket science here
timer thread as they said we'll get
started and that will wait for a for
additional queries for descriptors and
it will get reset if the device actually
got fully enumerated up by the way I
don't currently have this set up this
way but you could start to brute force
the vid pit if you got to the end of the
list
and hey the source code is available if
you want to do it but other
complications
windows and linux do treat these devices
a little bit differently
one thing I found is that linux sucks
and a whole lot of information at the
start
whereas windows sucks and a lot less
it's one of the few cases where windows
sucks less but alright so what did i do
for my testing primarily i use you dev
rules if you're not familiar with you
Deb rules on linux there are really
powerful tool and they're a little bit
addictive their kind of fun to play with
so what I did was set up some you do
have rules to say here's my white list
of mass storage devices and if it's not
on the list
you can't mount it right of my open
source solution is a better value it's
equally an effective but a better price
so why waste thousands of dollars when
you can be just as insecure for free
the way oh yeah all right
and not it's demo time some of the
gamers might get the reference there
Evan that was just for you know so yeah
here's a one version of the device yeah
I realize you can't see it so well
i holed up here but this is the slightly
bigger device as far as uh the board on
the right is just a programming board
and then I have an LCD display and I
have the actual development board this
in this case there's a thumb drive plug
into it
the pot you see there is just for
adjusting the LCD and then I have a red
light and a green light for the right
blocking status
all right so it comes on initially right
blocking so the green light should be on
the leftmost button can be used to
toggle that status and then the other
buttons are used in order to set the bid
and the pit right
so by the way is Javed job at are you
here somewhere
ok this this video is dedicated to job
at Mallik job it made a comment recently
how there seemed to be a lot of videos
out there on the internet for hacking
and security that are nothing but people
typing and clicking with music
so I dedicate this actual silent video
with no music
the job it if it plays if it doesn't
played i dedicate the microsoft
they work great in the speaker room
earlier at second
wait
it was already there
please stand by
if it helps you can imagine all time
music
the death of me
yeah
we get lucky today that's easy
of course if the have USB w can look in
the registry to make the demo quicker I
did
yeah
yeah
so here you see the welcome screen and
then it gives you an opportunity to set
it or it goes in automatic notice that
the green light time
and I did time work by the way didn't
instantly mount my drive
yeah
yeah
I should have said insert Monty Python
music yer
Oh
yeah
yeah
I get lucky this guy had a payroll file
on his desk top
yeah
yeah
ok
all right just still just a little food
for thought
how could we go where do we go from here
well we could possibly speed it up again
if you look in the registry and try to
find an authorized it pits were
previously loaded by the way if you're
not familiar with USB def view it's a
nice little tool
it tells you all kinds of its useful
information on previously attached to
USB devices not just mass storage
we could use the the larger device here
to divine the VIP pit and then possibly
pre-program a bunch of smaller devices
we're gonna like in mass go and attempt
to do something maybe say an
organization we knew what was authorized
like everything else you can thwart this
device it does only operate at full
speed
if you order to detect that you could
possibly say oh I i know that somebody's
doing something bad and you could use
proprietary drivers but you don't really
see a lot of that out there
it's kinda even in if you did that's
security through obscurity which we all
knows most security at all
one other thing I remember who remembers
what's the maximum packet size for a
full speed USB end . 64 bytes what is
the default block size 512
so what happens is it has to fragment
and unfragmented all those blocks so
that does give you a little bit of a
performance penalty
unfortunately but I don't know how you
could do anything better other than find
something that supports full speed right
just a couple of references these are in
the conference DVD you can go to my
github in a couple days since I kind of
forgot to update it before I came out
here are you can feel free to email me
i'm also available on Twitter just
at people's true i know it's not real
creative but people can find me so
thanks guys

Video Length: 43:54
Uploaded By: Christiaan008
View Count: 182,525

Related Software Products
USB Flash Security++
USB Flash Security++

Published By:
Kashu System Design Inc.

Description:
Add encryption to USB Flash Drive on the market.br It locks by the password by only removing!br Data in a USB Flash Drive is protected by a password.Useful Security Tool.br br Features:br [Install on USB Flash Drive] br Install the tool which is for unlocking security on USB Flash Drive, so security can be unlocked by the PC without installing [USB Flash Security].br [Lock by password] br When install this software on USB Flash Drive, password for unlocking security is ...


Related Videos
00576-SYROUSBU8CAMnB  Spy U8 USB Flash Drive DVR Mini Camera
00576-SYROUSBU8CAMnB Spy U8 USB Flash Drive DVR Mini Camera

http://www.ecbidbuy.com/mini-usb-flash-drive-spy-camera-hidden-dvr-camcorder-recorder-security-video_p227.html?language=en Mini DV Caméra Vidéo Usb Espion Numérique Détection De Mouvement HD DVR USB Flash Memoria Sticker Grabadora De Voz Espía Plug & Play HD USB Stick Spion Kamera mini Spy Camera Bewegungmelder Video Bilder Tonaufnahme
Video Length: 02:23
Uploaded By: ECbidbuy.com
View Count: 363,691

Learn to Use Free File Security Encryption Software
Learn to Use Free File Security Encryption Software

http://www.SafeHouseEncryption.com Hide those incriminating photos and videos. Protect secret documents. Make files and folders invisible until you enter your password. SafeHouse is fast, trusted and free encryption software for hard disks and USB Flash drives. hr / bClosed Caption:/b hello my name isfont color="#CCCCCC" Peter a bridge on/fontfont color="#E5E5E5" the/font font color="#CCCCCC"president pc dynamics in chief architect/font of thefont ...
Video Length: 09:33
Uploaded By: Peter Avritch
View Count: 87,303

Step 2: How to copy or backup security camera video to a usb drive of a H.264 DVR
Step 2: How to copy or backup security camera video to a usb drive of a H.264 DVR

This video shows how to copy or backup a short video clip from IPlex security camera DVR to a zip, flash or jump drive via USB port of DVR. hr / bClosed Caption:/b ok this video how to actually back up a file onto a USB drive so you can play it on your computer and we looked at video of a red firebird pulling into the parking lot I made a note of the date and time of that that was July thirtieth 2013 and that was about 152 ...
Video Length: 05:24
Uploaded By: American Wireless Alarm Security, Cameras & Access Control Systems Florida
View Count: 76,837

USB Memory Stick Security
USB Memory Stick Security

DigInfo: http://movie.diginfo.tv - The number one cause of sensitive information leaks are attributed to the theft or loss of employees USB memory sticks when they are taken outside the office. Corporations have been apprehensive about using USB memory sticks for transferring documents for this reason, with some companies risking the productivity of their employees by banning their use. Silver Star has come up with their new Iron Security USB Memory Software, which conceals files. It ...
Video Length: 01:34
Uploaded By: ikinamo
View Count: 28,172

USB Disk Security 6.0.0.126 + Patch (Full Version) - Free Download by in1world.com.wmv
USB Disk Security 6.0.0.126 + Patch (Full Version) - Free Download by in1world.com.wmv

USB Disk Security 6.0.0.126 + Patch (Full Version) - Free Download Downloading Link: http://www.in1world.com/setups/antivirus/USB_Disk_Security_6.0.0.126.zip
Video Length: 08:10
Uploaded By: in1world
View Count: 23,212

Stealth Security Pro - Spy Camera Pen Cam HD - Hidden DVR Camcorder - USB Spy Gear Gadget
Stealth Security Pro - Spy Camera Pen Cam HD - Hidden DVR Camcorder - USB Spy Gear Gadget

Get it from Amazon.com - https://t.co/kgcviqmrXa Stealth Security Pro - Spy Camera Pen Cam HD - Hidden DVR Camcorder - 32GB SD Card - Spy Gear Gadgets USB Mini Digital Video Recorder Equipment - Nanny, Pinhole, Surveillance, Home Security Systems - Best Buy Covert Spycam Cameras & Cams hr / bClosed Caption:/b the series was tell security pro HD pen camera quick setup video so when i first received the Box open it up take out the ...
Video Length: 08:57
Uploaded By: Stealth Security Pro
View Count: 22,024

Comment: USB Thumb Drives from Tech Events are a Massive Security Risk
Comment: USB Thumb Drives from Tech Events are a Massive Security Risk

USB Thumbs Drives are a massive hacking vector. At tech events it has become normal to be give a large number of these drives and you would be wise to simply throw them away. To Ask Questions Email: Question@EliTheComputerGuy.com Patreon Campaign for a Geekier world: http://www.patreon.com/elithecomputerguy Signup for our email list at: http://www.elithecomputerguy.com/email-signup/ (#Microstopped... We will never forget)br ...
Video Length: 06:34
Uploaded By: Eli the Computer Guy Live
View Count: 19,172

How to download usb disk security free (full version)
How to download usb disk security free (full version)

download link: http://www.mediafire.com/?23trx2bkfc2dbjq follow these steps to get full version: step1:download the software from internet. step2:open file file using a winrar. step3:open setup.exe and install it. step4:you get a trail version. step5:open the serial given with setup. step6:open usb disk security. step7:open information tab step8:click on register step9:copy the username first and paste it in the ...
Video Length: 03:00
Uploaded By: rkotheviper111
View Count: 18,062

Step 3: How to play backup H.264 Plex security dvr video clip off a usb drive on a windows pc
Step 3: How to play backup H.264 Plex security dvr video clip off a usb drive on a windows pc

Step 3: Once you've copied video to a usb jump drive on your security system dvr, this shows you how to playback a H.264 Plex security camera system video clip from a usb jump drive on a windows based pc. hr / bClosed Caption:/b ok now we're going to take the video that we backed up on our USB drive and play it back on our computer the first thing we do is we take the USB drive and inserted into the computer's USB port and the important ...
Video Length: 04:18
Uploaded By: American Wireless Alarm Security, Cameras & Access Control Systems Florida
View Count: 11,693

Copyright © 2025, Ivertech. All rights reserved.