PoisonTap - exploiting locked machines w/Raspberry Pi Zero

แชร์
ฝัง
  • เผยแพร่เมื่อ 8 ก.ย. 2024

ความคิดเห็น • 858

  • @lockpickinglawyer
    @lockpickinglawyer 7 ปีที่แล้ว +170

    Interesting, and clever. Good to see you back making videos.

    • @jon.schnee
      @jon.schnee 3 ปีที่แล้ว +5

      Hi LPL 👋🏼

    • @tako-0
      @tako-0 3 ปีที่แล้ว +2

      hold up

    • @backinyourcommentsectionag3191
      @backinyourcommentsectionag3191 3 ปีที่แล้ว +6

      So you're telling me, THE LockPickingLawyer has an interest in ethical hacking too? how cool can one man possibly be?!?

    • @sp69
      @sp69 3 ปีที่แล้ว

      Hello there

    • @aranlufthansa45
      @aranlufthansa45 3 ปีที่แล้ว

      Get the hell outta here LPL and stick to locks not computers

  • @SaltyViper
    @SaltyViper 7 ปีที่แล้ว +389

    Instructions too clear, cement stuck in usb ports.

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว +60

      Happens to all of us

    • @SaltyViper
      @SaltyViper 7 ปีที่แล้ว +1

      Samy Kamkar btw, how long does it take on average to install the back door?

    • @knifebosstutorials
      @knifebosstutorials 7 ปีที่แล้ว +2

      Samy Kamkar What is cement, link?

    • @SaltyViper
      @SaltyViper 7 ปีที่แล้ว +10

      Knife Boss literally cement

    • @knifebosstutorials
      @knifebosstutorials 7 ปีที่แล้ว

      xxXSalty_Viper420Xxx Oh lol

  • @dvdwlsh
    @dvdwlsh 7 ปีที่แล้ว +29

    Rad. Definitely prime for the Mr. Robot Season 3 arsenal. These are the uploads Kor Adana lives for.

  • @guser436
    @guser436 5 ปีที่แล้ว +5

    I feel scared just watching your videos in case you're exploiting through TH-cam LOL. Thanks for your videos, you inspire me to learn more

  • @viktike
    @viktike 7 ปีที่แล้ว +188

    Like I would visit your website after this video. LOL

  • @007order007
    @007order007 7 ปีที่แล้ว +205

    Time to smash my MacBook and move to a log cabin in the woods

    • @tomcummings3471
      @tomcummings3471 7 ปีที่แล้ว +1

      lol xD because it's funny. I understand the sentiment

    • @mephi5t0
      @mephi5t0 7 ปีที่แล้ว +1

      Instead of just chaining your laptop to the desk, we need another lock panel to cover its USP ports while gone. Easy. Easier then woods

    • @dadautube
      @dadautube 7 ปีที่แล้ว

      good idea, but such a device can work via the Bluetooth too and if your laptop's Bt is already on and active then it's still vulnerable!

    • @DustinRodriguez1_0
      @DustinRodriguez1_0 7 ปีที่แล้ว +1

      Nah, just don't leave the house and sleep on top of it.

    • @TriegaDN
      @TriegaDN 7 ปีที่แล้ว

      +dadautube
      Can they access your bluetooth when they can't get past the lock screen of your computer or access to ports? I don't use bluetooth much at all, but it always requires approval from both systems, right?

  • @Skidday
    @Skidday 7 ปีที่แล้ว +62

    Your videos are always amazing and a source of inspiration, thanks a lot

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว +39

      Thanks, happy to share them!

    • @Matthew-cw5fe
      @Matthew-cw5fe 7 ปีที่แล้ว +4

      By inspiration I think he means illegal things

  • @Biltrax2
    @Biltrax2 7 ปีที่แล้ว +7

    The cement link on the description killed me hahaha
    Great video mate, very nice idea! Maybe you could step it up a notch and perform a full own of the victim box using a set of predefined exploits and automated attacks?

  • @upcycle
    @upcycle 7 ปีที่แล้ว +5

    4:35 "to protect the client machine. I suggest adding cement to all your USB ports " LOL

  • @ale-lx9gp
    @ale-lx9gp 7 ปีที่แล้ว +1

    Samy's like an eclipse, he doesn't show too often, but when he do....IT'S EPIC!

  • @AndrewsalTk
    @AndrewsalTk 7 ปีที่แล้ว +46

    He's alive! :D

  • @WaffenKammerYT
    @WaffenKammerYT 7 ปีที่แล้ว +2

    I have no idea what any of this means but it sounds cool as hell.

  • @gyros2323
    @gyros2323 7 ปีที่แล้ว +19

    Fantastic project! Now we only need to get one of the super rare raspberry pi zeros.

    • @joshuagolembiewski5383
      @joshuagolembiewski5383 7 ปีที่แล้ว

      Got mine a few weeks ago. $.99 haha $1.05 after tax.

    • @4.0.4
      @4.0.4 7 ปีที่แล้ว +3

      Joshua Golembiewski Did you also buy a GTX1080 for $9.99?

    • @joshuagolembiewski5383
      @joshuagolembiewski5383 7 ปีที่แล้ว

      No, but from the same place I got a GTX 970 for 310 like a year ago :p

    • @markg5465
      @markg5465 7 ปีที่แล้ว

      Microcenter?

    • @joshuagolembiewski5383
      @joshuagolembiewski5383 7 ปีที่แล้ว

      Yup, Microcenter haha

  • @Roxor128
    @Roxor128 7 ปีที่แล้ว

    Thumbs up for not only showing and explaining the exploit, but also explaining how to defend against it.

  • @austing.8682
    @austing.8682 7 ปีที่แล้ว +10

    YESS I KNEW THE SILENCE MEANT SOMETHING AMAZING WAS COMING!!! Samy, is this your job? If not how do you have the time/money for this?

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว +6

      Woot! Not my job, I just enjoy security so spend a lot of time learning and trying things.

    • @austing.8682
      @austing.8682 7 ปีที่แล้ว +3

      Samy Kamkar Ah ok. You are very inspirational! Makes me want to tinker with stuff.

  • @jlebrech
    @jlebrech 7 ปีที่แล้ว +31

    wow, browsers still make http request when you're locked.

    • @TheStiepen
      @TheStiepen 7 ปีที่แล้ว +4

      of course. How would a browser know that the computer is locked. If it did know that i'd be far more concerned as that'd be very bad design

    • @ranikheir5272
      @ranikheir5272 7 ปีที่แล้ว

      Z3rd4, System Power Management Events? That for battery levels or change in power source, wrong link perhaps?

    • @reo4680
      @reo4680 4 ปีที่แล้ว

      Does it still work?

  • @trentbell6998
    @trentbell6998 7 ปีที่แล้ว +1

    dude I had no clue you were the myspace guy this is awesome

  • @b0e
    @b0e 7 ปีที่แล้ว +465

    don't cement your usb ports buy the newest macbook

    • @ahhashim
      @ahhashim 7 ปีที่แล้ว +9

      Chamaloche Hahahahhaaha :D

    • @h3pkatt
      @h3pkatt 7 ปีที่แล้ว +34

      Nice try, Apple.

    • @ahhashim
      @ahhashim 7 ปีที่แล้ว +8

      Next time people complain about the newest Macbook, show them this video..

    • @error.418
      @error.418 7 ปีที่แล้ว +27

      USB-C still works for this

    • @tairikuokami
      @tairikuokami 7 ปีที่แล้ว +1

      Even iPhone can be accessed, when the screen is locked, a similar exploit.

  • @Korruptionen
    @Korruptionen 7 ปีที่แล้ว +9

    "I filled every orifice of my body with wacky glue" -Carl

  • @spc-gg
    @spc-gg 7 ปีที่แล้ว +3

    Very good content, I'm actually impressed of an actual channel that deeply covers these subjects. Subbed

  • @PinkManGuy
    @PinkManGuy 7 ปีที่แล้ว +5

    99,999 subscribers? I've been waiting my whole life for this...
    *subscribe*

  • @chase_like_the_bank
    @chase_like_the_bank 7 ปีที่แล้ว

    Damn very impressive. He also has a write up in the description, which is useful because the video is a little dense.

  • @gazehound
    @gazehound 7 ปีที่แล้ว

    That animation for the poisontap page is incredible

  • @anthonyadame1197
    @anthonyadame1197 7 ปีที่แล้ว +57

    this video was worth the wait
    are there more coming?

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว +15

      Going to try to come up with some new stuff...any ideas?

    • @anthonyadame1197
      @anthonyadame1197 7 ปีที่แล้ว +3

      is it possible to tap into wireless cameras or SSTV

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว +30

      Good question. Many wireless cameras are IP based and provide web interfaces with default credentials...maybe I'll see if I can find a fun bypass to one of them.

    • @anthonyadame1197
      @anthonyadame1197 7 ปีที่แล้ว +2

      you should also try out SSTV all you need is a radio and a computer you can get a USB radio now these days

    • @anthonyadame1197
      @anthonyadame1197 7 ปีที่แล้ว

      but I'm talking about doing it for yourself

  • @Atristiel
    @Atristiel 7 ปีที่แล้ว +60

    I wanted to protect my PC from such an attack so I stuck Sugru to all USB ports, now I can't plug my keyboard and mouse back in. Help!

    • @griffin8062
      @griffin8062 7 ปีที่แล้ว +4

      LOL you're screwed

    • @RossPotts
      @RossPotts 7 ปีที่แล้ว +5

      Captain Chicken nah. break out the soldering wick and remove the old ports. then put in new ones. easy peasy...

    • @Atristiel
      @Atristiel 7 ปีที่แล้ว +4

      Ross Potts But I need my keyboard to import soldering header files and declare the USBport.change() function. I'm doomed!

    • @RossPotts
      @RossPotts 7 ปีที่แล้ว

      Atristiel ?

    • @tmtrainerred9968
      @tmtrainerred9968 7 ปีที่แล้ว +1

      +Ross Potts it's a joke.

  • @theprojectviewer15
    @theprojectviewer15 7 ปีที่แล้ว +1

    He's back! Great video once again Samy! This is so cool! Definitely going to get my hands on a Pi Zero to try this out.

  • @MrSquidels
    @MrSquidels 7 ปีที่แล้ว +7

    I've been waiting forever.... Finally!

  • @Abedoss
    @Abedoss 7 ปีที่แล้ว +1

    so the discussion here is all about construction worker skills :p
    great work Samy

  • @rohankapur5776
    @rohankapur5776 7 ปีที่แล้ว +1

    Yo Samy, great to see that you're making videos again, man.

  • @thompc99
    @thompc99 7 ปีที่แล้ว +13

    Welcome back Sammy ;) it was getting quiet with you gone for so long

  • @tommiedev
    @tommiedev 7 ปีที่แล้ว +2

    Finally you are back!! Welcome back, great video!

  • @TheJunkieBox
    @TheJunkieBox 5 ปีที่แล้ว +5

    You're unironically my hero.

  • @MiltosK
    @MiltosK 7 ปีที่แล้ว +1

    FINALLY i have been waiting far too long for another amazing video of yours!

  • @SeanMiller80
    @SeanMiller80 5 ปีที่แล้ว

    This dude is dangerous! I respect that you got the balls to put this type of stuff on youtube.

  • @bdot02
    @bdot02 7 ปีที่แล้ว

    I love how this would work on any OS. Though I'm not so sure you're going to be session jacking any major sites with this tool since they undoubtedly use secure cookies. Though I could be wrong I've never checked.

  • @avery1227
    @avery1227 7 ปีที่แล้ว +2

    Samy is my hero. In all seriousness I'm loving the content, keep it up!

  • @teadrinkingilluminati9173
    @teadrinkingilluminati9173 7 ปีที่แล้ว +1

    Very interesting, and powerful. But also the poisontap animation is really nice

  • @Skyler9604
    @Skyler9604 7 ปีที่แล้ว +2

    Thanks, Samy! It's been a while since your last video 😀

  • @kontrolerstreama
    @kontrolerstreama 7 ปีที่แล้ว +9

    Hello Samy, i have been waiting for you!

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว +33

      And I have been saving myself for you

    • @kontrolerstreama
      @kontrolerstreama 7 ปีที่แล้ว

      The details on github are great. I'll test it tomorrow and give you some feedback. Thanks.

    • @mehardeepdeepu9584
      @mehardeepdeepu9584 7 ปีที่แล้ว

      eh ha he

  • @stormxploit3675
    @stormxploit3675 7 ปีที่แล้ว +1

    I see the PoisonTap in a French mag. Amazing. Thank u !!

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว +1

      Awesome!

    • @stormxploit3675
      @stormxploit3675 7 ปีที่แล้ว

      Samy Kamkar yes haha. I've just a problem with the PoisonTap. I put it in the pc like usb (when it's locked) with a http website. After when I try to see the informations, I type cat cookies.log and the command answer : "listening"

  • @Ed-bf3fe
    @Ed-bf3fe 7 ปีที่แล้ว +1

    Video description: "buy cement for your USB ports here" ... he actually linked to a bucket of cement xD

  • @harshvaragiya1098
    @harshvaragiya1098 7 ปีที่แล้ว +1

    +Samy Kamkar .. Awesome work again ... already awaiting your next video ..

  • @MasterVashTheStampde
    @MasterVashTheStampde 7 ปีที่แล้ว +1

    This is MAGNIFICENT!
    Thank you for sharing sir!

  • @lopeschannel
    @lopeschannel 7 ปีที่แล้ว +6

    "Buy cement for your USB ports here" lol

  • @abdelhalim5967
    @abdelhalim5967 7 ปีที่แล้ว

    you're genuine dude, consider being a inventor

  • @NuggetandLevi
    @NuggetandLevi 7 ปีที่แล้ว

    Just finished cementing my usb ports. Thanks Samy. B)

  • @PaulRiddle0
    @PaulRiddle0 7 ปีที่แล้ว +1

    This guy is a legend
    please upload more videos

  • @Julian-vr1ed
    @Julian-vr1ed 7 ปีที่แล้ว +1

    PLS make more Videos! You are so good at what you are doing!

  • @mexitechnology7838
    @mexitechnology7838 7 ปีที่แล้ว

    Samy as always is good to see you here again thanks for all this information

  • @susancolley9871
    @susancolley9871 7 ปีที่แล้ว +1

    Thanks for posting and keeping it real, Samy!!! :-)

  • @zephyfoxy
    @zephyfoxy 7 ปีที่แล้ว

    Now I finally have something to use my Pi0 for! Strictly for experimentation that is.

  • @vincentwolfe
    @vincentwolfe 7 ปีที่แล้ว +1

    Well that is fairly terrifying. Good work!!

  • @plain2596
    @plain2596 7 ปีที่แล้ว +7

    Welcome back, Samy.

  • @shadowguidr7042
    @shadowguidr7042 7 ปีที่แล้ว +1

    Good to see you again Samy!

  • @brinckau
    @brinckau 7 ปีที่แล้ว +3

    "by default, Windows, OS X and Linux recognize an ethernet device, automatically loading it as a low-priority network device and performing a DHCP request across it"
    Debian Linux doesn't do that (unless you configure it to do so). The ethernet device would not even be activated automatically. I guess it would only work with a few highly pre-configured Linux distributions (like Ubuntu). For the dozens of others, I guess that nothing would happen by default. Or did I miss something?

    • @michael_the_chef
      @michael_the_chef 7 ปีที่แล้ว

      Kali Linux -> Working, Windows 7,8,8.1,10 not working.
      Windows Device-Manager shows only RNDIS/Ethernet Gadget......
      Can someone help me?

  • @SharkLasers380
    @SharkLasers380 7 ปีที่แล้ว +1

    MORE! I've missed seeing your stuff!

    • @SharkLasers380
      @SharkLasers380 4 ปีที่แล้ว

      This comment still holds true.

  • @deathstroke2582
    @deathstroke2582 7 ปีที่แล้ว

    that's the thing with MacBook pro at least the 2016 one all its ports are only chargers and all of them process information too you can probably program it to disable transferring information tho

  • @guygustavson2346
    @guygustavson2346 7 ปีที่แล้ว +4

    Interesting. Really though, if someone has unobserved physical access to your hardware there's nothing you can do to stop an intrusion short of destroying the computer.

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว +2

      This is getting harder and harder as we see more trusted hardware and good crypto built into devices, eg iPhone's Secure Enclave (which is in new MacBook Pors)

    • @guygustavson2346
      @guygustavson2346 7 ปีที่แล้ว +2

      Reminds me of the cold war between the Dish Network guys, and the pirate viewers. The smart card com path was exploitable on many levels, they went back and forth with many exploits and fixes until the hackers started glitching the VCC to the card to make the program counter brown out and jump to exploitable locations. Dish responded by emebbing smoothing caps in the card. the hackers emulated the hardware and software of the cards in their own hardware. Disk blacklisted the older (emulated) cards and firmware... back and forth , back and forth until what is now a pretty secure and un-exploited solution.

  • @RedSubaru1
    @RedSubaru1 7 ปีที่แล้ว

    now we wait for the news websites to eat this up, btw awesome job samy i have been waiting for a new project to work on

  • @KerrieMenzer
    @KerrieMenzer 7 ปีที่แล้ว +1

    well done, dude!

  • @benmaynard3059
    @benmaynard3059 11 หลายเดือนก่อน

    Hope you are safe and well out there Sammy ✌

  • @UnixfoxEurope
    @UnixfoxEurope 7 ปีที่แล้ว +4

    What's the name of the song in the intro? I can't find it on the "Epoch Rises" soundcloud.

    • @Ouazolka
      @Ouazolka 5 ปีที่แล้ว

      Also want the name

  • @samiant5199
    @samiant5199 7 ปีที่แล้ว +3

    its so good to see another upload

  • @lieutenantspock7943
    @lieutenantspock7943 7 ปีที่แล้ว

    very great project Sams. Good idea and perfect to use a RasPi. Thanks for sharing.

  • @etmasikewo
    @etmasikewo 3 ปีที่แล้ว

    Thanks, I got 2 pots of cement with your link

  • @katrinabrinson5342
    @katrinabrinson5342 5 ปีที่แล้ว +1

    Incredible. According to your site.. this works on all operating systems correct? Windows/Linux/OS X

  • @thedankoona_5854
    @thedankoona_5854 7 ปีที่แล้ว +4

    THE KING IS BACK!!!! YEAHS!!!

  • @mrlaser3580
    @mrlaser3580 5 ปีที่แล้ว +1

    Hahah so my professor used your video on "hacking" a lock, and showed it on my university

  • @RemikPi
    @RemikPi 7 ปีที่แล้ว

    very interesting idea. thanks for publishing. good it's not utilizing any RCE vulnerabilities to act remotely... yet.

  • @plzdonhack
    @plzdonhack 7 ปีที่แล้ว +7

    2:32 Redtube YAS

  • @PotatoOfDestruction
    @PotatoOfDestruction 7 ปีที่แล้ว +1

    Samy is still my hero!

  • @levimarch5752
    @levimarch5752 7 ปีที่แล้ว

    Finally someone has done this and I been asking Hak5 to do this for a long time.

  • @user-st7ud2nc6z
    @user-st7ud2nc6z 7 ปีที่แล้ว +1

    I love you Samy!!

  • @KryoTronic
    @KryoTronic 5 ปีที่แล้ว +1

    Just came here cause I saw you on Wired and they did u a disservice

  • @MrK-ll6oz
    @MrK-ll6oz 7 ปีที่แล้ว

    Not gonna lie I clicked the "buy cement" link xD. Took me a second

  • @angryburrito7411
    @angryburrito7411 7 ปีที่แล้ว +1

    This was an amazing representation of the back end of Poison Tap and the data it mines. How long does the Pi need to be connected in order for the backdoors and remote access to be installed or do you leave it connected? (hopefully you can rename the LAN.. lol) Also what does the front end interface to access this data look like? Is there a web server that you can connect to or is it command line with ssh/telnet? Very cool and incredibly innovative.

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว

      30-60 seconds, once you've left the attack location, you can plug it into your own machine and ssh in to obtain the cookies.

    • @angryburrito7411
      @angryburrito7411 7 ปีที่แล้ว

      When you do that, aren't you then infecting your own machine?

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว

      Yeah, kill your browser when doing it

  • @Killberty
    @Killberty 7 ปีที่แล้ว +1

    Finally a new video :)
    i waited soooo long for this

  • @unknownlegend660
    @unknownlegend660 7 ปีที่แล้ว

    Great video fam ...Thanks so much I really want to learn how to initiate an attack like this

  • @AnttiVi
    @AnttiVi 7 ปีที่แล้ว

    Haha, very nice. Machines so blindly trust whatever random hardware is plugged in. Going to change in the future, unfortunately probably the change will be commercially driven instead of security driven.

  • @WreckingU
    @WreckingU 7 ปีที่แล้ว

    Wow nice job! I can't wait to try this out for pen testing!

  • @purifierphoenixthemecca
    @purifierphoenixthemecca 7 ปีที่แล้ว +1

    Just got my raspberry pi zero today, Can't wait to try it next week lol.... I hate studying for finals my god :/ Got no time to hack shit :/

  • @Frighyz
    @Frighyz 7 ปีที่แล้ว

    Finally you are back! Quick question, would it be possible to do sslstrip with PoisonTap to bypass https?

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว +1

      It actually bypasses HTTPS for sites that *do* use HTTPS but do *not* set the Secure flag on cookies.

    • @Frighyz
      @Frighyz 7 ปีที่แล้ว

      Samy Kamkar I see, wasn't aware of how secure cookies worked. Still amazing that it automatically bypasses websites without the secure flag. Great work!

    • @Frighyz
      @Frighyz 7 ปีที่แล้ว

      Also, how did you make the amazing animations? They look absolutely sick!

  • @FlameSoulis
    @FlameSoulis 7 ปีที่แล้ว +1

    So there are the preventative measures mentioned, but what about fixing it? Other than updating any critical passwords on a non-infected system that were leaked, how would you remove the back door?

    • @wow503
      @wow503 7 ปีที่แล้ว +3

      As far as I understand, the backdoor persists in the browser cache, so you should be able to remove it by clearing (or disabling) your browser cache. Enabling "private browsing" on current browsers should remove the backdoor as soon as you close the browser, as it basically clears things such as cache, history and cookies when the browser is closed. The attack won't evade the browser's JavaScript sandbox so its effects will be confined to the browser(s) that was/were running when the system was attacked and not spread to other browsers or the file system or anything like that. So the harm is limited, but it's an interesting attack nonetheless since it uses a pretty uncommon attack vector.

    • @purpleice2343
      @purpleice2343 7 ปีที่แล้ว +1

      So basically this attack can be removed with Ccleaner.
      LMAO.

  • @prawnstarrr
    @prawnstarrr 7 ปีที่แล้ว +4

    your on the news bro!!

  • @AD-pv7ub
    @AD-pv7ub 6 ปีที่แล้ว +1

    You didn't mention ways to secure your machine for Linux users. Is NetworkManager vulnerable to this too? What if you have a custom static-configured resolv.conf and no DHCP DNS support?
    Edit: what about people who use uMatrix (a resource blocking browser extension) that's configured to also automatically blocks s?
    Edit 2: or, even simply, what if you just disabled all USB network device drivers? I have a similar security precaution on my machines already. It's also advisable to disable USB keyboards at the kernel level. If you need to recover your machine, you can still use USB keyboards from the BIOS level and from stuff you boot over USB, of course.
    Edit 3: I've blacklisted usbnet on my machines. But are there any other common drivers I'm missing?

  • @RecapHDOfficial
    @RecapHDOfficial 7 ปีที่แล้ว

    Cool video Samy! How did you create that animation of PoisonTap?

  • @mcgamingproyt
    @mcgamingproyt 7 ปีที่แล้ว

    Just got my pi zero in the mail, now i know what to use it for :D

  • @DaGunzinger
    @DaGunzinger 7 ปีที่แล้ว

    I'm always happy to see a new video of you :)

  • @jasonlisonbee
    @jasonlisonbee 7 ปีที่แล้ว

    If you don't want the ugliness of cement, open the computer and disconnect the ports. If they can't be unplugged, snip the connections. With power off. I wonder if there is a way to physically jumper them to reversibly disable them.

  • @burnedoils
    @burnedoils 7 ปีที่แล้ว

    thx for exposing this dangerous flaw

  • @drue9516
    @drue9516 3 ปีที่แล้ว

    I dont know if you read these at all. But i got a question. Is it possible to catch the camera feed from a drone fly close enough to my labtop? Second would be, can i "by force" take control of flight??

  • @myemail3010
    @myemail3010 7 ปีที่แล้ว

    interesting video. Going to look into this poison tap.

  • @jan_harald
    @jan_harald 7 ปีที่แล้ว

    especially good if ran on an rooted android
    most phones already have tether capabilities so it doesn't seem suspicious if I just want to "charge my phone for a bit, I forgot my wall adapter, sorry"

  • @Clenbutterfly
    @Clenbutterfly 7 ปีที่แล้ว

    Samy, and others, which programming language do you recommend to learn for hardware stuff like this as a first?

  • @trabajosinformaticos9812
    @trabajosinformaticos9812 7 ปีที่แล้ว

    why not? You added an execution of a session meterpreter reverse in case the browser was not in execution? It was not very difficult to include part of the code of your usbdriveby video

  • @theom402
    @theom402 7 ปีที่แล้ว

    202 comment! You are finally back! Awesome! Ur vids are so cool!

  • @samnesbitt9735
    @samnesbitt9735 7 ปีที่แล้ว

    I'm on the mailing list but never get mail. I would love to stay up to date on your projects as they are always really educational.

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว

      Sorry, I've been pretty lazy about the list...also MailChimp charges a ton to email out so need to find a less expensive alternative soon!

  • @Simon8162
    @Simon8162 7 ปีที่แล้ว

    Surely almost all sites are using HTTPS now and most are on the HSTS preload list so I don't think this would be too effective for those sites

  • @HariWiguna
    @HariWiguna 7 ปีที่แล้ว

    Wow... that is scary! Instead of emulating an Internet over USB device, would it be possible to do a similar attack over WiFi? Emulating a common access point name such as "Netgear" and accepting whatever password the PC submits.

    • @samykamkar
      @samykamkar  7 ปีที่แล้ว

      Yup, you could set up a rogue AP, deauth users from their normal APs, and then get them to jump onto yours and perform a similar attack. This wifi attack is actually pretty common (though won't work in a number of cases) -- this essentially extends the attack to times that machines won't jump on rogue wifi or are hardwired (as in corporate settings).

  • @lordhieros
    @lordhieros 7 ปีที่แล้ว

    Love the videos. Idea for new video "Exploiting Smart-homes".