This $5 Device Can Hack Your Computer Even If It's Locked

This $5 Device Can Hack Your Computer Even If It's Locked
Highlights
  • PoisonTap is built for the $5 Raspberry Pi Zero
  • Samy Kamkar claims PoisonTap "entirely automated"
  • Some computer best practices can help avoid such attack
Advertisement

Security experts have long advocated strong passwords for computers, however, a new $5 device developed by hacker Samy Kamkar is claimed to hack into any system in just a minute. The new $5 device dubbed PoisonTap is said to break into any computer system even if it's password-protected as long as a browser is running at the background.

"PoisonTap is built for the $5 Raspberry Pi Zero without any additional components other than a Micro-USB cable & microSD card, but can work on other devices that can emulate USB gadgets such as USB Armory and LAN Turtle," describes Kamkar in his blog post.

Explaining how the exploit device works, Kamkar wrote when PoisonTap is plugged into a locked (password-protected) computer - whether Windows, OS X, or Linux - it emulates an Ethernet device over USB (or Thunderbolt) and then takes over all Internet traffic from the machine. The device next siphons and stores HTTP cookies from the Web browser for the Alexa top 1,000,000 websites while exposing the internal router to the attacker, making it accessible remotely. The $5 device then installs a persistent Web-based back door in HTTP cache for hundreds of thousands of domains and common Javascript CDN URLs all with access to the user's cookies. This allows the attacker to remotely force the user to make HTTP requests and proxy back responses (GET & POSTs) with the user's cookies on any back doored domain. Kamkar says that the $5 device does not require the machine to be unlocked. It creates a back door and remote access persists even after device is removed from the computer.

Kamkar told Motherboard, "It's entirely automated. You plug it in, you leave it there for a minute, then you pull it out and you walk away. You don't even need to know how to do anything."

He adds that PoisonTap can evade various security mechanisms including password protected lock screens, routing table priority and network interface service order, http only cookies, multi-factor authentication, and DNS pinning among others.

He also gives away some of the ways users can protect their computers from PoisonTap exploit such as closing browser every time user walks away from computer, disabling USB/Thunderbolt ports is also effective, or switching to encrypted sleep mode are some of the ways users can avoid attack.

 

Comments

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Ketan Pratap
Ketan Pratap is the editor at Gadgets 360 - with over 12 years of experience covering the technology domain. With a breadth and depth of knowledge in the field, he's done extensive work across news, features, reviews, and opinion pieces. But what's truly inspiring about Ketan is how he spends his free time. He's often found gazing at snow-capped mountains from over 20,000 feet while sitting on the hood of his car, taking in the breathtaking beauty of nature. His passion for the great ...More
Russia Starts Blocking LinkedIn Website After Court Ruling
Microsoft Visual Studio for Mac, Visual Studio 2017 Release Candidate for Windows Launched
Share on Facebook Gadgets360 Twitter Share Tweet Snapchat Share Reddit Comment google-newsGoogle News
 
 

Advertisement

Follow Us

Advertisement

© Copyright Red Pixels Ventures Limited 2024. All rights reserved.
Trending Products »
Latest Tech News »