Posted on by and filed under Boston Key Party CTF 2015.

This challenge consists of a capture file containing USB packet. We notice that one of the USB devices floods most of the capture with several hundred packets per second. The device uses the address 12, and hence can be filtered using:

usb.device_address == 12

Read more on this challenge by visiting