PoisonTap, a hacking tool that uses a Pi Zero

PositionTap

We usually talk about the good things that the Hardware libre for us, but it can also do bad things and even things of dubious legality. In the latter we could place the gadget PoisonTap, a gadget that allows us to hack any device regardless of whether it has a fingerprint sensor, iris sensor, passwords or any other type of security. And all thanks to a simple Pi Zero board it only costs 5 dollars.

PoisonTap works through a Pi Zero but the most important thing is the software

PoisonTap can used to know our weaknesses but also for our data to be stolen, everything will depend on the intentions of its owner. In any case, it is interesting that many of the most powerful security systems are compromised thanks to a small Raspberry Pi board.

In this case, the creator of PoisonTap, Samy kamkar, install a piece of software on the Pi Zero that emulates an Internet network. This when connecting to any computer through a USB port makes the computer is deceived and thinks that it is sending the data to the Internet but it is making it to PoisonTap. So it does not matter if we have any protection because the unencrypted data will be sent or passed through the Pi Zero board. In the video of the article you can see in more detail the operation of this device.

In addition, the Kamkar software makes the computer first recognizes the fake PosionTap network before the real internet connection, something that in itself has merit; personally I think that the latter is the most interesting of the whole project, to create a software that cheats the management of the ports of the operating system. But still, PoisonTap is still interesting and at least worth trying, although always for educational and not illegal purposes.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.