Course info
May 24, 2016
1h 17m

USB devices, especially flash drives, have become commonplace. As a result, USB storage devices are frequently a part of forensic investigations. An easy way of making forensic copies of USB storage devices is needed to facilitate such investigations. This course centers around building an inexpensive pocket forensic duplicator based on the FTDI Vinculum II microcontroller. You will learn the basics of making forensic copies of USB mass storage devices no matter the method employed. While building this device you will also learn how to use microcontrollers and interface with standard electronic peripherals such as LEDs and LCD displays. When you've finished this course, you will have a basic understanding of the Vinculum II microcontroller, which you can apply to more advanced applications such as USB write blocking and device impersonation, which are to be covered in a follow-up course. Software required: Freely available Vinculum II Integrated Development Environment (Windows XP or higher, possibly in a virtual machine). Hardware Required: FTDI V2DIP2 64-pin development module, 5 LEDs of 3 colors (optional), 16x2 LCD display (optional), and prototyping board (optional).

About the author
About the author

Dr. Phil Polstra (aka Infosec Dr. Phil) is a professor of Digital Forensics at Bloomsburg University. He is also the author of a number of books on hardware hacking and forensics. He has made repeat appearances at DEFCON, BlackHat, B-sides, 44CON, GrrCON, and other conferences all around the world.

More from the author
USB Forensics: Fundamentals
2h 9m
5 Nov 2015
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello everyone. I am Dr. Phil Polstra, and welcome to my course on USB forensic duplication. I am a digital forensics professor at Bloomsburg University of Pennsylvania. I'm also a frequent conference presenter that has spoken on USB forensics, hardware hacking, Linux forensics, Windows forensics, aviation security, and many other topics at conferences such as DEFCON, Blackhat, BruCON, GrrCON and 44CON, around the world. USB devices, including flash drives, have become extremely commonplace. Because of this, many forensic investigations now require forensic duplicates of USB storage devices. In this course, we're going to walk you through building a pocket USB forensic duplicator, based on the FTDI Vinculum II microcontroller. Now, some of the major topics that we will cover include: how to make a forensic copy of a USB storage device, creating devices with the FTDI Vinculum II microcontroller, maximizing performance of microcontroller applications, and sprucing up devices by adding LEDs and LCD displays. By the end of this course, you'll have a fully functional forensic device and a solid foundation to get you started building your own microcontroller devices and/or those described in the next course on USB write-blocking and impersonation. Before beginning this course, you should be familiar with the topics from the USB Forensics: Fundamentals course. I hope you'll join me on this journey to learn more about USB forensics and microcontrollers with the USB forensic duplication course at Pluralsight.