USG Protects Hacking Attacks

USG Protects Hacking Attacks

USG Protects Hacking Attacks

Category : Blog

USG Protects Hacking Attacks

USG Protects Hacking Attacks. Do you ever feel the need for a hardware firewall for your USB ports? USG v1.0 is one such effective device that users can use to identify the maliciousness stored on suspicious USB drive. It is fully open firmware and two STM32F4 microprocessors make this possible.

So, what if you find a random USB drive on a table? You will pick it up and use it? Can you trust it properly? What if the firmware running on your computer has already been modified by the manufacturer? There is no simple method to get an answer of these questions.

But a device automatically trusts every device you plug in, which may increase you risk. You have to take precautions.

To identify this problem, USG was created. . It’s a small tool for the privacy-oriented people who are habitual of adding extra layers of security in their digital lives.

What is USG? How does this hardware firewall work?

USG Protects Hacking Attacks

To use USG, you need to put its one end to your PC and the suspected USB device into the other. It automatically scans the USB device for USB attacks, which can harm you via USB driver exploits and hidden/visible evil functionality.

The USG uses two STM32F4 microprocessors communicating over a high-speed serial link which allows only a restricted set of commands to pass. So, a malicious host is barred from corrupting the USB drive’s firmware.

The USG supports mass storage devices, flash drives, keyboard, and mice. In future updates, you can expect to see some extra devices. Talking about the speed, USG Version 1 uses 12 Mbps hardware, so the storage transfer should run around 1MBytes per second.

You should note that the USG protects you from low-level USB attacks, but it can’t save you from viruses stored in the drive’s file system. Also, it wasn’t designed to resist physical voltage overload attacks. So, it doesn’t claim to protect you fully from the USB Killer. However, it might be possible that after destroying the USG’s circuits, the voltage surge will be reduced to a safe level.


Most Popular Training Courses at Indian Cyber Security Solutions

Summer Training for CSE, IT, BCA & MCA Students 

Network Penetration Tester Training

Ethical Hacking  training

Python Programming training

CEH V9  training

Diploma in Network Security Training

Secured Coding in Java

Certified Network Penetration Tester 

Certified Web Application Penetration Tester 

Certified Android Penetration Tester 

Certified Python Programming 

Advance Python Training 

Reverse Engineering Training  

Amazon Web Services Training  

VMware Training 


Leave a Reply