Sunday 20 September 2015

USBKILL




USBKILL :

usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.

HOW TO RUN :

Download software link : https://github.com/hephaest0s/usbkill

step1 : cd Desktop

step2 :cd usbkill-master

step3 :ls

step4 :chmod +x setup.py

step5 :ls

step6 : ./setup.py --help-command

step7 : ./setup.py install

step8 : ls

step9 :cd usbkill/

step10 :ls

step11 :chmod +x usbkill.py

step12 :./usbkill.py



proof of concept :



Why?

Some reasons to use this tool:

In case the police or other thugs come busting in (or steal your laptop from you when you are at a public library as happened to Ross). The police commonly uses a « mouse jiggler » to keep the screensaver and sleep mode from activating.

You don’t want someone to retrieve documents (such as private keys) from your computer or install malware/backdoors via USB.

You want to improve the security of your (Full Disk Encrypted) home or corporate server (e.g. Your Raspberry).

Feature List :

(version 1.0-rc.4)

Compatible with Linux, *BSD and OS X.
Shutdown the computer when there is USB activity.
Customizable. Define which commands should be executed just before shut down.
Ability to whitelist a USB device.
Ability to change the check interval (default: 250ms).
Ability to melt the program on shut down.
RAM and swap wiping.
Works with sleep mode (OS X).
No dependency except secure-delete iff you want usbkill to delete files/folders for you or if you want to wipe RAM or swap. sudo apt-get install secure-delete
Sensible defaults

Supported command line arguments (partially for devs):

-h or --help: show help message, exit.
--version: show version of the program, exit.
--no-shut-down: if a malicious change on the USB ports is detected, execute all the (destructive) commands you defined in settings.ini, but don’t turn off the computer.
--cs: Copy program folder settings.ini to /etc/usbkill/settings.ini