Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • SecTor 2022: The Power of the Pico
  • Cyber Attacks
  • Data Breach

SecTor 2022: The Power of the Pico

3 years ago Tyler Reguly
SecTor 2022: The Power of the Pico

I’m excited to share that I will be speaking at SecTor this year in the tools track. While the SecTor schedule is not yet finalized, I’m currently listed as speaking at 10:15am on October 6th. The talk, The Power of the Pico: Replacing Expensive Toys with the Raspberry Pi Pico, will cover how to use a Raspberry Pi Pico to perform BadUSB attacks. There are commercial tools out there that will perform these attacks such as the Hak5 USB Rubber Ducky and the FlipperZero, but the idea here is to make it as cheap and accessible as possible.

As is often the case in tech, this talk is not based on a new idea. Even the idea of using the Pico as a hacking device isn’t new. However, several activities motivated me to push my version of the idea further. Over the summer of 2021, I had built a cheap StreamDeck alternative using a Pico and an RGB Keypad. This work got me really interested in using the Pico as an HID and I wanted to do more. When I found out that SecTor 2021 was a go and we’d be bringing back the IoT Hack Lab, I was excited to meet up with colleagues that I hadn’t seen since before the pandemic and bring something new and exciting to surprise them with. So, I sat down and wrote some code to perform a BadUSB attack using the Pico and brought the device with me to SecTor in 2021.

I ended up demoing the thing for the entire duration of the conference. People were constantly coming up to discuss it and see it in action, really impressed by the simplicity of it. I spoke with a few people who had written their own implementations for use in their own research, but they hadn’t discussed it publicly. That was when I decided I want to beef up my code and give it a proper release, which is exactly what will happen at SecTor.

During the talk, we’ll discuss the Pico itself and look at the Python code that I developed to make it do what it does. We’ll talk about where to get my code and the payloads that I’ve developed for demonstration purposes. If you’re brand new to microcontrollers, you’ll learn a few things, but even if you’ve used similar projects in the past, you might still pick up a few tips and tricks that can be used to your advantage in the future.

We all know that the first session of the day on the second day of a con is where people sip coffee and shake off their hangovers. If you’re looking for some fun, geeky conversation that isn’t going to melt your mind but will still be interesting, then I recommend coming to hang out with me for The Power of the Pico: Replacing Expensive Toys with the Raspberry Pi Pico.

The post ” SecTor 2022: The Power of the Pico” appeared first on TripWire

Source:TripWire – Tyler Reguly

Tags: TripWire

Continue Reading

Previous A Traveller’s Guide to Staying Cyber safe
Next Uber Blames LAPSUS$ Hacking Group for Recent Security Breach

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

2 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

3 hours ago [email protected] (The Hacker News)
  • Data Breach

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

18 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

18 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach

When Cloud Outages Ripple Across the Internet

21 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

23 hours ago [email protected] (The Hacker News)

Recent Posts

  • Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
  • CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog
  • http://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
  • [Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate
  • Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT