Skip to main content

Posts

Showing posts from November, 2016

This Raspberry Pi-Based Hacking Device Can Help You Break into Any Computer

Passwords, iris scanning, and fingerprint protection are all here to help protect a computer from unauthorised access, but all of these have been rendered useless by a device that costs only $5 to build. Samy Kamkar has shown in a video that it takes only a $5 Raspberry Pi Zero computer and free software to bypass protection on a computer using backdoor that’s installed through USB. The hacking device is called PoisonTap and can emulate an Internet over USB connection that tricks the computer into believing that it’s connected via the Ethernet. Using the software, the computer is configured to prioritise the USB connection over wireless or Ethernet, so it begins sending unencrypted web traffic to PoisonTap. Related    Over 2,500 Twitter Accounts Hacked And Replaced By Pornbots The device automatically collects HTTP authentication cookies and session data from the majority of websites, with the hacker explaining that the top one million websites in Alexa ar...

Backdoor/Rootkit Comes Pre-installed

Here's some bad news for Android users again. Nearly 3 Million Android devices worldwide are vulnerable to man-in-the-middle (MITM) attacks that could allow attackers to remotely execute arbitrary code with root privileges, turning over full control of the devices to hackers. According to a  new report  from security rating firm BitSight, the issue is due to a vulnerability in the insecure implementation of the OTA (Over-the-Air) update mechanism used by certain low-cost Android devices, including BLU Studio G from US-based Best Buy. Backdoor/Rootkit Comes Pre-installed The vulnerable OTA mechanism, which is associated with Chinese mobile firm Ragentek Group, contains a hidden binary — resides as  /system/bin/debugs  — that runs with root privileges and communicates over unencrypted channels with three hosts. According to the researchers, this privileged binary not only exposes user-specific information to MITM attackers but also acts as a rootkit, potentiall...