TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The $5 PoisonTap quickly, completely hijacks even a locked computer’s internet

37 pointsby ghoshover 8 years ago

15 comments

wmfover 8 years ago
Previously: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12966673" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12966673</a>
ChuckMcMover 8 years ago
The sad thing for me is that for years on &quot;spy&quot; movies and action movies the hero (or villan) would go into an office or a house or something, plug in a USB device and &quot;boom!&quot; own the machine. I took some comfort that this wasn&#x27;t really possible, and then this happens.
评论 #12974803 未加载
评论 #12975216 未加载
Tepixover 8 years ago
Wow! I&#x27;m super impressed by what Samy Kamkar managed to pull off. Let&#x27;s discuss mitigation on Linux because I don&#x27;t want to cement the USB ports on my shiny new laptop just yet.<p>Some suggestions:<p>* When the GUI is locked, activating new USB devices or even activating a connection via a cable to the ethernet port should be delayed until it is unlocked and (optionally) the user confirms that it&#x27;s ok.<p>* New unknown network devices should require confirmation<p>* A network interface that announces a subnet larger than &#x2F;24 or &#x2F;16 (for IPv4) should require a confirmation by the user.<p>What scripts and hooks are being called whenever there is a change to USB and networking? That would be the place to start. Can there be a &#x2F;etc&#x2F;udev&#x2F;rules.d&#x2F; rule that matches all devices?
评论 #12975134 未加载
评论 #12976163 未加载
mdaniover 8 years ago
If you put it into a smaller form factor such as USB sticks and drop them in the parking, you&#x27;ll have a decent chance of getting inside that company. If you could make it very small then it could hide inside a iphone charging cable for example which looks completely harmless from outside.
评论 #12975087 未加载
nardiover 8 years ago
The crazy thing is I knew about all of these technologies separately, but never would have guessed that this was possible. I knew my laptop prefers Ethernet. I knew an Ethernet-connected device could serve DHCP. I knew DHCP could provide DNS servers, and that the DNS servers could resolve to whatever they want. I knew if you could pwn DNS you could pretend to be another website, and sideload whatever other sites you want. I knew you could tell a browser via HTTP cache headers to cache something forever.<p>None of these technologies are remotely new. This has been sitting under everyone&#x27;s noses for a long, long time. I wonder how long this basic idea has existed in secret.
评论 #12975214 未加载
grey-areaover 8 years ago
There are better details on this web page for the vulnerability, apparently it affects Mac, Windows, Linux computers with default configs:<p><a href="https:&#x2F;&#x2F;samy.pl&#x2F;poisontap&#x2F;" rel="nofollow">https:&#x2F;&#x2F;samy.pl&#x2F;poisontap&#x2F;</a>
评论 #12975068 未加载
dom0over 8 years ago
Mainstream OSes and desktop environments (and not just Qubes an people with extra software installed) should <i>really</i> adopt the ask-before-using-USB-devices policy.<p>If you connected this to a Qubes computer nothing would happen, except a popup behind the lock screen asking for permission. But you could also generally forbid USB network controllers, for example.
评论 #12975096 未加载
elmigrantoover 8 years ago
This is interesting, though, looks a bit like &quot;attacker might replace explorer.exe&quot; type of vulnerability: if you can physically access a device, you&#x27;re already in; just like you need to be admin or root to replace system binaries, meaning pwnage long before executables are replaced.
评论 #12975107 未加载
WatchDogover 8 years ago
This seems like it would be noticed quickly if access to the internet stops working. Can it proxy intercepted traffic to the real internet? Does the raspberry pi need its own internet connection in order to act as a proxy, or can it get a real internet connection via the host device somehow?
评论 #12974665 未加载
评论 #12974693 未加载
ausjkeover 8 years ago
just use https and you will be safe.
评论 #12974696 未加载
评论 #12974783 未加载
评论 #12974955 未加载
matt_wulfeckover 8 years ago
You could accomplish the same thing by plugging in an Ethernet cable that ran traffic through a malicious reverse proxy. The difference here is that the USB device presents itself as an Ethernet device.
efotoover 8 years ago
I&#x27;m staring at my MAC now and wondering if my Little Snitch will prevent this type of hijacking. I expect the firewall to ask me how to treat a new interface before sending packets there.
评论 #12975036 未加载
analogmemoryover 8 years ago
Seems like an even worse problem for the new Mac Book Pro&#x27;s, all Thunderbolt&#x2F;USB-C ports. You could probably spoof any type of input.
评论 #12975118 未加载
TekMolover 8 years ago
How is this different from just using a WiFi Hotspot? It also &quot;contains the whole internet&quot; but does not need physical access.
评论 #12975227 未加载
jtchangover 8 years ago
The fix is to upgrade to the new Macbook. No more USB ports!
评论 #12975205 未加载