Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Saturday November 19 2016, @05:42AM   Printer-friendly
from the smart dept.

Submitted via IRC for TheMightyBuzzard

A new attack tool that can compromise locked computers will leave you wishing you could take your machine with you everywhere you go.

Dubbed PoisonTap, the tool consists of a Raspberry Pi Zero controller with a USB or Thunderbolt plug, loaded with open source software. All in all, this setup can be achieved by anyone who has $5 to spare.

What is PoisonTap capable of, you ask?

Plugged into a locked/password protected computer, it can hijack all Internet traffic from the machine, open the internal router to the attacker, collect HTTP cookies and sessions from web browsers, install a web-based backdoor in HTTP cache for hundreds of thousands of domains, install a backdoor into the machine that does not depend on the device being plugged in, and more. It is capable of compromising Macs and PCs running Windows.

There is also a YouTube video (5m22s).

Source: https://www.helpnetsecurity.com/2016/11/17/poisontap-compromise-locked-computers/


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by dlb on Saturday November 19 2016, @06:28AM

    by dlb (4790) on Saturday November 19 2016, @06:28AM (#429308)
    Probably nothing.

    For PoisonTap to compromise a computer, the Raspberry Pi would have to be physically plugged into it, a user would have to be logged in with a web browser running, and the attack would only affect sites with unsecured connections (no https) . Anything's possible, but I don't think I'll lose sleep worrying about my home computers being PoisonTapped.
    Starting Score:    1  point
    Moderation   +1  
       Informative=1, Total=1
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 2) by Pino P on Saturday November 19 2016, @01:24PM

    by Pino P (4721) on Saturday November 19 2016, @01:24PM (#429380) Journal

    True of this proof of concept. Just wait until it emulates a composite device containing both a network adapter and a keyboard. Then it can Win+R* http://somecommandandcontrol.example [somecommandandcontrol.example] and take over.

    * or whatever sequence is appropriate for the host OS that it detects

    • (Score: 3, Informative) by dlb on Saturday November 19 2016, @02:40PM

      by dlb (4790) on Saturday November 19 2016, @02:40PM (#429403)

      True of this proof of concept. Just wait until it emulates a composite device containing both a network adapter and a keyboard. Then it can Win+R* http://somecommandandcontrol.example [somecommandandcontrol.example] and take over.

      If I understand it, PoisonTap spoofs an nds server to collect non-secured cookies from websites without an https connection. The cookies are then used to log into those sites with authentication information stored in a cookie. This would require a person to have an open login to that site. If no such cookies and login states exist, then the exploit is dead-ended.

      PoisonTap might be a way to implement a man-in-the-middle, but I don't see how it could compromise the computer directly. And if a person is standing there alone with your computer, and free to bring any hardware along, he probably has better exploits to use.

    • (Score: 2) by dlb on Saturday November 19 2016, @02:48PM

      by dlb (4790) on Saturday November 19 2016, @02:48PM (#429408)
      (I wasn't done with my previous post when I pulled an ADHD and sent it off. Sorry about that.)

      I wanted to mention in closing that a keyboard attached to the Raspberry Pi wouldn't have any more privileges than if you'd plugged it directly into the usb.