A $5 Raspberry Pi-Based Hacking device can break your computer in second
Homehackingsecurity

A $5 Raspberry Pi-Based Hacking device can break your computer in second

SHARE:

Info! It costs only $5 to build this kind of device, hacker says
Passwords, iris scanning, and fingerprint protection, are all here to help protect a computer from unauthorized access, but all of these have been rendered useless by a device that costs only $5 to build.

Samy Kamkar has shown in a video that it takes only a $5 Raspberry Pi Zero computer and free software to bypass protection on a computer using backdoor that’s installed through USB.

The hacking device is called PoisonTap and can emulate an Internet over USB connection that tricks the computer into believing that it’s connected via the Ethernet. Using the software, the computer is configured to prioritize the USB connection over wireless or Ethernet, so it begins sending unencrypted web traffic to PoisonTap.

The device automatically collects HTTP authentication cookies and session data from the majority of websites, with the hacker explaining that the top one million websites in Alexa are currently supported. Two-factor authentication is bypassed as well, as PoisonTap looks for cookies and doesn’t attempt to brute-force into the system or compromise login credentials.

How to remain protected

While this is worrying to say the least, Kamkar explains that the hacking device becomes useless if the computer doesn’t have at least one tab running in a browser. Additionally, he says that computers with USB ports disabled, or put in hibernation mode are also secure because this way all processes are suspended and the hacking device can no longer siphon data.

In case you’re wondering if things like antivirus solutions or stronger passwords can block PoisonTap, this isn’t the case, as the hacking device doesn’t rely in any way on brute-force attacks, so the length of your passwords doesn’t make any difference.

Furthermore, given the fact that it uses free software and a specially crafted backdoor, antivirus solutions won’t detect it, leaving the computer fully vulnerable to attacks.

The entire process is detailed in the video below and, as a general recommendation, make sure you close your browser before leaving the desktop (we know nobody does that, but this is the simplest thing we can all do to stay protected).
Name

2016,2,2017,1,360degree,1,360video,1,4k,1,5g,1,8K,1,A series,1,account,2,adobe,1,ads,2,aerial,1,altaba,1,ambassador,1,andriod,30,android,2,antivirus,3,Apple,53,apple watch,1,Apps,34,appstore,1,arrest,1,assassin creed 3,1,atm,1,attack,3,audio,1,backdoor,1,backup,1,ban,3,bank,4,battery,4,best of 2016,2,beta,1,bitcoins,1,bittorrent,8,block,1,bluetooth,1,britney spear,1,browser,8,business,2,bypass,1,callofduty,1,camera,1,cars,1,cash,1,cellebrite,1,CES2017,3,charge,1,china,2,chrome,2,CIA,1,cocacola,1,commandprompt,1,complaint,1,connection,2,copyright,2,cortana,1,crash,1,crime,3,cyanogen,1,cyberlocker,1,D-link,1,darkweb,1,dash charge,1,database,1,databeach,5,ddos,6,deadpool,1,death,1,dell,2,denuvo,1,design,1,desktop,1,dji,1,dmca,2,dns hijacking,1,domain,1,doom,1,download,1,downloader,2,drone,3,durable,1,dvdvideosoft,1,edge,1,eset,1,ex.ua,1,expert,1,explode,3,exploit,1,extratorrent,2,facebook,11,fake,3,fbi,1,FDA,1,findmyiphone,1,fireEye,1,firefox,2,FTC,1,g6,1,gadget,11,galaxy A5,1,galaxy A7,1,galaxy C5,1,game,19,game of throne,1,gaming,2,Gear s2,1,Gear s3,1,giveaway,1,google,28,google playstore,1,hacker,5,hacking,75,hangouts,1,history,1,htc,1,htc 10,1,huawei,3,hyperloop,1,illegal,3,imax,1,imessage,1,improvement,1,india,3,information,1,inspire2,1,instagram,3,intel,1,internet,19,ios,28,ios 10.2,1,iphone,33,iphone 7s,1,iphone6,4,iphone6plus,3,iphone6s,4,iphone7,2,iphone7plus,3,japan,1,kapustkiy,1,kaspersky,3,keyboard for andriod,1,kickass,1,killer,1,laptop,1,latest,13,leak,11,lg,2,limes audio,1,linkedln,2,linux,3,live video,1,lottery,1,lynda,1,mac,1,macbook,5,malware,10,medical report,1,microsoft,43,money,1,monitor,1,movie,1,Music,5,nasa,2,navy,1,netflix,4,network,1,news,2,nintendo,2,noaa,1,nokia,4,nokia 6,1,north korea,1,note5,1,note7,5,nougat,7,nsa,1,office,1,oneplus,4,oneplus 3,1,oneplus 3T,1,oneplus4,1,online,1,os,5,ourmine,2,pacemaker,1,password,2,patch,1,pc,2,periscope,1,photography,2,picture,1,piracy,7,pirate,6,pirate bay,6,pixel,6,pixel xl,1,pizza,1,playstation,4,playstore,3,pokemon go,1,police,1,powershell,1,prisma,1,prison,1,privacy,2,project Valerie,1,Projector,1,protection,1,prototype,1,putlocker,1,qualcomm,1,ransomware,2,raspberrypi,1,rating,1,razer,1,recall,6,red star,1,redstone,1,refund,1,remove,1,rename,1,review,2,rumors,4,russia,7,s6,1,s6edge,1,s7,1,s7edge,2,samsung,27,satelite,1,searchengine,1,security,34,selfie,1,server,1,shadow broker,1,shutdown,8,siri,1,skippable,1,skype,1,smartphone,101,socialnetwork,11,software,1,sony,5,space,2,sqlinjection,1,stolen,1,supercomputer,1,supermario run,2,support,1,system,2,tabs2,1,tango,1,target,1,tech,53,Technology Explained,4,tesla,1,the mummy,1,tools,1,torrent,10,torrent site,1,track,1,trademark,1,TV show,1,twitter,5,ubisoft,2,uk,4,unlock,1,upcoming,1,update,22,us,5,usbkiller,1,users,1,USTR,2,vespa,1,video,4,videoplayer,1,vines,1,visualstudio,1,vlc,1,VR,3,vulnerability,15,vulnrrability,1,warning,1,watchdog2,1,website,2,what.cd,2,whatsapp,1,wifi,3,wikileaks,1,windows,33,windows10,5,wireshark,1,xbox,4,xiaomi,1,xperia,2,yahoo,1,youtube,5,youtubekids,1,
ltr
item
MOUNT TECH: A $5 Raspberry Pi-Based Hacking device can break your computer in second
A $5 Raspberry Pi-Based Hacking device can break your computer in second
raspberry pi
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilpTsJXQOOH0GgDcavntNNw9GfcPwgy9Sk277rk3T4Cz_R7Uz7C2bLP-3Q6tzx6C3wRq5ge5x3T4KlRgtngN0CphNDgufq-UtVlb8xFkQcRmq9KWbyduhOMTZ-HMMwl2ztvHb7bAM8_DVZ/s1600/computer-hacking-boynton-la.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilpTsJXQOOH0GgDcavntNNw9GfcPwgy9Sk277rk3T4Cz_R7Uz7C2bLP-3Q6tzx6C3wRq5ge5x3T4KlRgtngN0CphNDgufq-UtVlb8xFkQcRmq9KWbyduhOMTZ-HMMwl2ztvHb7bAM8_DVZ/s72-c/computer-hacking-boynton-la.jpg
MOUNT TECH
http://mount-tech.blogspot.com/2016/11/a-5-raspberry-pi-based-hacking-device-can-break-your-computer-in-second.html
http://mount-tech.blogspot.com/
http://mount-tech.blogspot.com/
http://mount-tech.blogspot.com/2016/11/a-5-raspberry-pi-based-hacking-device-can-break-your-computer-in-second.html
true
5023700227490855537
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy