Skip to main content

Questions tagged [usb]

an industry standard used for connecting to and powering peripheral devices (keyboards, mice, cameras, printers, external hard drives, etc) from a computer or other USB capable device.

0 votes
0 answers
131 views

I want to perform a DFU restore on an iPhone 15 Pro Max. The phone is jailbroken, so I want to restore it with DFU restore on a new PC. The problem is that I'm scared enough to think that the cable I ...
John Doe's user avatar
2 votes
1 answer
78 views

I recently had to look into some USB-related vulnerabilities and was surprised to see that in NIST's NVD analysis the attack vector was stated as "Network" (AV:N) for CVSS 3.1. Examples are ...
raner's user avatar
  • 153
2 votes
2 answers
154 views

We would like to sell a device (Raspberry Pi) to our customers that does process customer data. The device contains sensitive data and software to which the customer should not have access. The ...
HugoTheHolz's user avatar
0 votes
1 answer
105 views

I bought a no-name USB stick that acts as a SDXC/microSDXC card reader (2 slots). I mounted it on a RaspberryPi and saw something like this : /sdb1 Available: 500Mo Used: 40Mo Can you/Should you ...
DisplayName's user avatar
4 votes
2 answers
2k views

Let's assume: I have a piece of software (with a webUI) that has access to a USB device through the host OS. The software itself can't be changed. The software has the ability to perform a firmware ...
Bob Ortiz's user avatar
  • 7,715
3 votes
1 answer
248 views

Goal: I'm seeking feedback on the most secure setup for creating and accessing an encrypted database (KDBX4 format) that minimizes exposure to potential remote attacks. This database will contain ...
arderstt's user avatar
1 vote
2 answers
211 views

I had written an OS installation image to USB to be launched on untrusted PC. Can the untrusted PC modify USB's installation image, for example Windows 10 image, so that when I plug in the same USB to ...
CurtisB's user avatar
  • 43
2 votes
1 answer
126 views

For network-based attacks, there are many tools that scan a system for open ports and perform fingerprinting to find out what software is running on the system. Does something similar exist for USB ...
raner's user avatar
  • 153
0 votes
1 answer
295 views

I am a cybersecurity professional who is interested in researching the field of injectables. Does a device exist, or can be made, that if plugged into a computer would instantly start attacking the ...
Julius Santiago's user avatar
0 votes
2 answers
280 views

If I purchase a supposedly brand new USB stick (or micros SD, or similar portable storage devices) online, and I don't quite know the origin where they are produced, and I am a bit paranoid, is there ...
Tristan Tran's user avatar
1 vote
0 answers
108 views

I want to create pendrive or external HDD, that is read only. To be precise - I want to be open to read files on it (documents or video files), but to prevent files from being copied off disk. As I ...
Herman Pompka's user avatar
0 votes
1 answer
353 views

I was under the impression that an antivirus for Linux makes sense only for installing in business computers. Checking Norton/BitDefender/Karpesky I don't see any Linux option for the first or any non ...
Jim's user avatar
  • 221
0 votes
0 answers
97 views

Due to certain circumstances, we are forced to keep some copyrighted data in an external hard disk. due to privacy concerns, we want to allow this data to be accessed only from a trusted/office ...
John's user avatar
  • 1
1 vote
1 answer
275 views

If we buy for instance a laptop with an OS pre-installed e.g. Ubuntu and but the original seller was not reputable and there are doubts with the preinstall. My question is: if we use the laptop to ...
Jim's user avatar
  • 221
1 vote
1 answer
166 views

Running the following code on a linux machine returns the partition tables and partial config of the hard-drive and USB devices. fdisk -l returns Disk /dev/nvme0n1: 238.47 GiB, 256060514304 bytes, ...
Marshall's user avatar

15 30 50 per page
1
2 3 4 5
18