A mere 5$ device named Poison Tap hacks your computer even if it is password protected - chaprama | Insights from the world of Technology and Lifestyle


Thursday, November 17, 2016

A mere 5$ device named Poison Tap hacks your computer even if it is password protected

poison tap hack

Are you aware that it is possible to hack a computer without even opening it .Seems strange at the first instance, but it is now possible to hack a computer with a small device and free software. More surprising aspect is that the device costs mere 5$. Let's check it out.

Samy Kamkar, is a well-known computer hacker .He is known to create low-cost hacking tools that included  password-pilfering keylogger disguised as a USB charger, a key-sized dongle that jimmies open electronically locked cars and garages, and a DIY stalker app that mined Google Streetview.  

His  new creation PoisonTap, an Ethernet over USB device, that can be used to hijack all Internet traffic on a target machine, even if the computer was password protected and locked.It utilizes free programming and a $5 Raspberry Pi Zero microcomputer. Inserting the Raspberry Pi to a USB connector, the gadget goes to work. In all of 30 seconds, it sidesteps your lock screen and starts introducing an indirect access that works even after the gadget is expelled from the USB port.

In the wake of connecting to the PoisonTap gadget, it starts to copy the web over USB gadget. Once recognized, your portable PC expect it's associated by means of ethernet, and starts to send all decoded web movement to the microcontroller. You're existing Wi-Fi system's security won't spare you, as the gadget tricks your PC into prioritizing its connection although connected to  your Wi-Fi.

The gadget then starts taking any HTTP authentication cookies  that you'd use to sign into private accounts, and also session information.More awful, because of the way it's planned, two-figure validation won't help. Since PoisonTap siphons cookies, and not the actual login details, it's completely fit for capturing accounts utilizing two-factor. 

However, Sammy states that for the device to work you need a browser running in the background.So even if your PC is locked with the browser window open that will do the job.He, however, suggests few ways to avoid getting hacked.

1)Always ensure to leave your computer in hibernation mode rather than sleep mode if you are away since hibernation mode suspends all the processes.

2)While leaving your system close your web browser  and make it a habit clean the browser cache regularly.

3)Users of Mac must make sure to enable File vault 2 before you leave your system.

No comments:

Post a Comment