This $5 Device Can Hack Your Computer Even If It's Locked

Advertisement
By Ketan Pratap | Updated: 17 November 2016 16:37 IST
Highlights
  • PoisonTap is built for the $5 Raspberry Pi Zero
  • Samy Kamkar claims PoisonTap "entirely automated"
  • Some computer best practices can help avoid such attack
This $5 Device Can Hack Your Computer Even If It's Locked

Security experts have long advocated strong passwords for computers, however, a new $5 device developed by hacker Samy Kamkar is claimed to hack into any system in just a minute. The new $5 device dubbed PoisonTap is said to break into any computer system even if it's password-protected as long as a browser is running at the background.

"PoisonTap is built for the $5 Raspberry Pi Zero without any additional components other than a Micro-USB cable & microSD card, but can work on other devices that can emulate USB gadgets such as USB Armory and LAN Turtle," describes Kamkar in his blog post.

Explaining how the exploit device works, Kamkar wrote when PoisonTap is plugged into a locked (password-protected) computer - whether Windows, OS X, or Linux - it emulates an Ethernet device over USB (or Thunderbolt) and then takes over all Internet traffic from the machine. The device next siphons and stores HTTP cookies from the Web browser for the Alexa top 1,000,000 websites while exposing the internal router to the attacker, making it accessible remotely. The $5 device then installs a persistent Web-based back door in HTTP cache for hundreds of thousands of domains and common Javascript CDN URLs all with access to the user's cookies. This allows the attacker to remotely force the user to make HTTP requests and proxy back responses (GET & POSTs) with the user's cookies on any back doored domain. Kamkar says that the $5 device does not require the machine to be unlocked. It creates a back door and remote access persists even after device is removed from the computer.

Kamkar told Motherboard, "It's entirely automated. You plug it in, you leave it there for a minute, then you pull it out and you walk away. You don't even need to know how to do anything."

Advertisement

He adds that PoisonTap can evade various security mechanisms including password protected lock screens, routing table priority and network interface service order, http only cookies, multi-factor authentication, and DNS pinning among others.

He also gives away some of the ways users can protect their computers from PoisonTap exploit such as closing browser every time user walks away from computer, disabling USB/Thunderbolt ports is also effective, or switching to encrypted sleep mode are some of the ways users can avoid attack.

Advertisement

 

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. Google Pixel 10 Pro Series, Pixel Buds 2a, Pixel Watch 4 Design Leaked
  2. Redmi 15 Leaked Renders Indicate It Will Arrive in These Colourways
  1. Oppo Reno 14FS 5G Price, Design and Specifications Leaked Ahead of Anticipated Debut
  2. Samsung Galaxy A07 Listed on Google Play Console With Design, Key Specifications: Report
  3. Microsoft SharePoint Hack: Probe on Whether Chinese Hackers Found Flaw via Alert
  4. Samsung Reportedly in Talks With OpenAI, Perplexity to Offer Gemini AI Alternatives on Galaxy S26 Series
  5. Redmi 15 Design Renders, Specifications Leaked; Tipped to Arrive in Three Colourways
  6. Google Pixel 10 Pro, Pixel 10 Pro XL Spotted in Moonstone Colourway Alongside Pixel Buds 2a and Pixel Watch 4
  7. Meta Names ChatGPT Co-Creator Shengjia Zhao as Chief Scientist of Superintelligence Lab
  8. Who-Fi: An AI-Powered Wi-Fi Technology That Can Identify and Track Individuals Without Cameras
  9. NASA’s X-59 Moves Closer to First Flight with Advanced Taxi Tests and Augmented Vision
  10. Unusual Plasma Waves Above Jupiter’s North Pole Can Possibly Be Explained
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.