PoisonTap unlock each computer in 30 seconds

PoisonTap: Even the strongest passwords do not seem to be enough, as Samy Kamkar proves, and sometimes they do not take just a few seconds.

Kamkar's new exploit is called PoisonTap, and it uses free software running on a Raspberry Pi Zero microcomputer. After plugging the Raspberry Pi into a USB adapter on the goal the device gets to work.
poisontap

In 30 seconds, it bypasses the lock screen and starts installing a backdoor that works even when the device is removed from the USB port.

If you think a strong password will save you, you are wrong.

PoisonTap does not work this way. It does not try to guess your password, but bypasses it completely - and it seems to work.

After connecting the PoisonTap device, it imitates a device that provides from USB. Once detected by the target computer, it assumes it is connected via ethernet, and starts sending all unencrypted web traffic to the microcontroller.

Your existing network security can not save you as the device fools the target computer to give priority to all other connections and not to the one you are already connected to.

Acting as one man-in-the-middle, the device then starts stealing all control cookies HTTP s you've used to log into your accounts, as well as session data from a million of the top sites on the internet according to Alexa.

Due to the way it is designed, two-factor authentication may not help, since links are made by cookies stored by PoisonTap rather than by actual login credentials.

The only downside to its effectiveness is that it requires the user to have a tab of the browser open to the locked device. But the overwhelming majority does not shut down browsers before downloading the lid to our laptop.

Kamkar gave some tips to protect yourself, although he recognizes that most are not practical:

Set your computer to hibernate rather than sleep. In hibernation, the computer suspends all its processes.
Close your browser every time you close your machine.
Regularly clean your browser's cache.
Use full disk encryption
Disconnect the USB ports

Watch this

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).