Welcome

ADVANCE DEFENCE           MECHANISM

It is a software to block/prevent from highly weaponize hardware hacking
deviceslike USB rubber ducky and Bash bunny

      KNOW MORE






ADVANCE DEFENCE MACHANISM ADM


The system to be developed to prevent hardware hacking devices like USB rubber ducky. It is a centralized system. There is a two way to block USB and HID devices.
1) USB module – Normal USB blocker (C# application)
2) ADM algorithm - Blocks USB rubber ducky & bash bunny
Advantages : Most of all USB Spread attacks be prevented. This is only a software to prevent these types of attacks. User – Friendly and Responsive UI. Password protected . Registry Editor was blocked also for administrator. (i.e Security Reasons)

USER AGREEMENT

A software license agreement defines how that software can be used and what happens in the event of breach.

SPLASH SCREEN & LOGIN MODULE

The login page allows a user to gain access to an application by entering their username and Password.

ADM DASHBOARD

1) USB Blocker module
2) ADM Module
3) Host File Editor
4) UAC Changer (for secure Desktop , i.e Prompt Behavior Changer)
5) About ADM
6) Exit

USB BLOCKER MODULE

A USB blocker or USB lockdown software allows companies to restrict unauthorized Portable storage devices from accessing endpoints. Read more about USB security.

HOST FILE EDITOR

It helps to manually update IP address point to loopback ip (127.0.0.1) via this software.

UAC CHANGER

You must either approve or deny the request in the UAC dialog box before you can do Anything else on your computer. This behavior is known as the secure desktop.

FAQ

1. How much time does ADM take to process and block the malware?

It would take around only few seconds to block the external device that contains sophisticated malware anomaly.

2. Is ADM secure?

A USB blocker enables organizations to ensure the security of their endpoints, stay safe from malware and loss of sensitive data through USB storage devices.

3.How does fileless malware infect a system?

Fileless malware often uses legitimate tools like PowerShell, WMI (Windows Management Instrumentation), or the Windows Registry to execute its malicious actions. It can get onto a system via phishing links, malicious attachments, or exploit kits that take advantage of vulnerabilities in software.

4. Where ADM can be used?

ADM can be used in the places where data provacy has to be avoided. It can be used in majorfields to prevent from fileless malware hacking .

Contact