A proposed Linux kernel driver, hid-omg-detect, scores USB HID devices via timing, latency, and fingerprinting to flag suspicious behavior without blocking input. 🔍
It targets BadUSB-style attacks and defers blocking to USBGuard, emphasizing transparency but relying on user-side control and enforcement. 🔐

🔗 https://itsfoss.com/news/linux-driver-proposal-malicious-hid-devices/

#TechNews #Linux #Kernel #USB #Cybersecurity #BadUSB #OpenSource #FOSS #Security #Privacy #Transparency #Software #Freedom #Developers #Tech #Driver

A New Linux Kernel Driver Wants to Catch Malicious USB Devices in the Act

If adopted, this kernel module would detect when a plugged-in USB device is acting suspiciously.

It's FOSS

Interessant und zu begrüßen:

Ein neuer Linux-Kernel-Treiber soll vor bösartigen USB Geräten schützen, indem er das "Verhalten" prüft. Werden zu schnell Tastatureingaben gemacht, ist es eher kein Mensch, der diese tätigt.

Finde ich einen super Vorschlag, aber wichtig ist, dass das auch nicht vor diesen Spannungs-USB-Sticks schützt, die das Mainboard grillen.

Wichtig: nur USB-Geräte anschließen, denen ihr vertraut. Ein gefundener USB-Stick gehört nicht dazu!

https://feed.itsfoss.com/link/24361/17314291/linux-driver-proposal-malicious-hid-devices

#Linux #badusb

A New Linux Kernel Driver Wants to Catch Malicious USB Devices in the Act

If adopted, this kernel module would detect when a plugged-in USB device is acting suspiciously.

It's FOSS
USBGuard - ArchWiki

Added new release v1.2.0 to flipper0-badUSB-linux-tester; Test your Flipper Zero BadUSB DuckyScripts without uploading payload into device

Now with more nice and consistent cli arguments.

🤔 pondering about add a new feature to compose DukyScripts based on other template scripts.

Something like:

```
REM This is an example of external script
EDS <open_terminal.txt>

STRING echo "The world is all that is the case"
```

and on open_terminal.txt content:
```
REM try to find and open a terminal
STRINGLN sh -c "xdg-terminal-exec||kgx||ptyxis||gnome-terminal||mate-terminal||xfce4-terminal||tilix||konsole||xterm||wezterm-gui"

DELAY 500
```

So it will create a new duckyScript based on small templates script, then test it locally and later upload it the duckyScript to flipperZero for definitive testing.

What do you think?

https://github.com/carvilsi/flipper0-badUSB-linux-tester

#badusB #flipperZero #duckyScript

GitHub - carvilsi/flipper0-badUSB-linux-tester: Test your Flipper Zero BadUSB Scripts without uploading payload into device

Test your Flipper Zero BadUSB Scripts without uploading payload into device - carvilsi/flipper0-badUSB-linux-tester

GitHub

Added more commands from FlipperZero DuckyScript to flipperZero badUSB tester for Linux.

ESC | ID | ALT | F2

By now I think that this is quite enough to cover my testing expectations.

https://github.com/carvilsi/flipper0-badUSB-linux-tester

#flipperZero #badUSB

GitHub - carvilsi/flipper0-badUSB-linux-tester: Test your Flipper Zero BadUSB Scripts without uploading payload into device

Test your Flipper Zero BadUSB Scripts without uploading payload into device - carvilsi/flipper0-badUSB-linux-tester

GitHub

Just published: flipper0badusb_test

Test on Linux your Flipper Zero BadUSB Scripts without loading the payload onto the Flipper device.

After experimenting for a while and writing some BadUSB Ducky scripts on Flipper Zero, I felt a bit overwhelmed by the workflow every time I wanted to test a change in the script. I've been searching and testing some other solutions but I found lot of issues related with Linux graphical environment permissions and I decided to write something simple to test and write my FlipperZero's DuckyScripts.

https://github.com/carvilsi/flipper0-badUSB-linux-tester

#flipperZero #flipper #badusb #testing

GitHub - carvilsi/flipper0-badUSB-linux-tester: Test your Flipper Zero BadUSB Scripts without uploading payload into device

Test your Flipper Zero BadUSB Scripts without uploading payload into device - carvilsi/flipper0-badUSB-linux-tester

GitHub
Plug, Play, Pwn: Hacking with Evil Crow Cable Wind

It’s a tiny hacking implant hidden inside a cable. Plug it into a computer, and it pretends to be a keyboard. Then it starts typing — fast. We’re talking up to 1,000 keystrokes per minute, all automated.

Mobile Hacker
Run BadUSB Script on a $3 Digispark (& how to change the keyboard layout)

YouTube