Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Poison Tap

Samy Kamkar had built a device that is called Poison Tap. It is a Raspberry Pi Zero which plugs into the victims USB port. The device that looks like an Ethernet connection, your computer inherently trusts this connection and this is where the exploit starts.

  • emulates an Ethernet device over USB (or Thunderbolt)
  • hijacks all Internet traffic from the machine (despite being a low priority/unknown network interface)
  • siphons and stores HTTP cookies and sessions from the web browser for the Alexa top 1,000,000 websites
  • exposes the internal router to the attacker, making it accessible remotely via outbound WebSocket and DNS rebinding (thanks Matt Austin for rebinding idea!)
  • installs a persistent web-based backdoor in HTTP cache for hundreds of thousands of domains and common Javascript CDN URLs, all with access to the user’s cookies via cache poisoning
  • allows attacker to remotely force the user to make HTTP requests and proxy back responses (GET & POSTs) with the user’s cookies on any backdoored domain
  • does not require the machine to be unlocked
  • backdoors and remote access persist even after device is removed and attacker sashays away



This post first appeared on Hacked Gadgets – DIY Tech, please read the originial post: here

Share the post

Poison Tap

×

Subscribe to Hacked Gadgets – Diy Tech

Get updates delivered right to your inbox!

Thank you for your subscription

×