Kaspersky: A powerful hacking tool can be created for as little as $20
Kaspersky Lab researchers have examined publicly available hardware and software tools for covert password interception and discovered that a powerful hacking tool can be created for as little as $20, and just a few hours of work by someone with basic programming knowledge. In an experiment they used a DIY Raspberry Pi based USB-device, configured in a specific way, and carrying no malicious software. Armed with this device, they were able to covertly collect user authentication data from a corporate network at a rate of 50 password hashes per hour.
The research started with a real story: in another investigation that Kaspersky Lab experts participated in, an insider (the employee of a cleaning company) used a USB-stick to infect a workstation inside a targeted organization with malware. Upon hearing the story, Kaspersky Lab security enthusiasts became curious about what else could be used by insiders to compromise a targeted network? And, would it be possible to compromise a network without any malware at all?
They took a Raspberry-Pi microcomputer, configured it as an Ethernet adapter, made some additional configuration changes in the OS running on the microcomputer, and installed a few publicly available tools for packet sniffing, data collection and processing. Finally, the researchers set up a server to collect intercepted data. After that, the device was connected to the targeted machine and started to automatically feed the server with stolen credential data.
The reason why this happened was that the OS on the attacked computer identified the connected Raspberry-Pi device as a wired LAN adapter, and automatically assigned it a higher priority than other available network connections and – more importantly – gave it access to data exchange in the network.
The experimental network was a simulation of a segment of a real corporate network. As a result, researchers were able to collect authentication data sent by the attacked PC and its applications, as they tried to authenticate domain and remote servers. In addition, researchers were also able to collect this data from other computers in the network segment.
Moreover, as the specifics of the attack allowed for intercepted data to be sent through the network in real time, the longer the device was connected to the PC, the more data it was able to collect and transfer to a remote server.
After just half an hour of the experiment researchers were able to collect nearly 30 password hashes, transferred through the attacked network, so it is easy to imagine how much data could be collected in just one day. In the worst-case scenario, the domain administrator’s authentication data could also be intercepted should they log into their account while the device is plugged-in into one of the PCs inside the domain.
The potential attack surface for this method of data interception is big: the experiment was successfully reproduced on both locked and unlocked computers running on Windows and Mac OS. However, researchers were not able to reproduce the attack on Linux based devices.
“There are two major things that we are worried about as a result of this experiment: firstly – the fact that we didn’t really have to develop the software – we used tools freely available on the Internet. Secondly – we are worried about how easy it was to prepare the proof of concept for our hacking device. This means that potentially anyone, who is familiar with the Internet and has basic programming skills, could reproduce this experiment. And it is easy to predict what could happen if this was done with malicious intent. The latter is the main reason why we decided to draw public attention to this problem. Users and corporate administrators should be prepared for this type of attack”, said Sergey Lurye, a security enthusiast and co-author of the research at Kaspersky Lab.
Although the attack allows for the interception of password hashes (a cipher-alphabetic interpretation of a plaintext password after it has been processed by a specific obfuscation algorithm), the hashes could be deciphered into passwords, since the algorithms are known or used in pass-the-hash attacks.
In order to protect your computer or network from attacks with help of similar DIY devices, Kaspersky Lab security experts recommend the following advice:
For regular users:
- On returning to your computer, check if there are any extra USB devices sticking out of your ports.
- Avoid accepting flash drives from untrusted sources. This drive could in fact be a password interceptor.
- Make a habit of ending sessions on sites that require authentication. Usually, this means clicking on a “log out” button.
- Change passwords regularly – both on your PC and the websites you use frequently. Remember that not all of your favorite websites will use mechanisms to protect against cookie data substitution. You can use specialized password management software for the easy management of strong and secure passwords, such as the free Kaspersky Password Manager.
- Enable two-factor authentication, for example, by requesting login confirmation or use of a hardware token.
- Install and regularly update a security solution from a proven and trusted vendor.
For system administrators
- If the network topology allows it, we suggest using solely Kerberos protocol for authenticating domain users.
- Restrict privileged domain users from logging into the legacy systems, especially domain administrators.
- Domain user passwords should be changed regularly. If, for whatever reason, the organization’s policy does not involve regular password changes, be sure to change this policy.
- All of the computers within a corporate network have to be protected with security solutions and regular updates should be ensured.
- In order to prevent the connection of unauthorized USB devices, a Device Control feature, such as that available in the Kaspersky Endpoint Security for Business suite, can be useful.
- If you own the web resource, we recommend activating the HSTS (HTTP strict transport security) which prevents switching from HTTPS to HTTP protocol and spoofing the credentials from a stolen cookie.
- If possible, disable the listening mode and activate the Client (AP) isolation setting in Wi-Fi routers and switches, disabling them from listening to other workstation traffic.
- Activate the DHCP Snooping setting to protect corporate network users from capturing their DHCP requests by fake DHCP servers.
Besides intercepting the authentication data from a corporate network the experimental device can be used for collecting cookies from browsers on the attacked machines.
Pingback: d8xc45m78oe35rm739
Pingback: asdfsdfxcvxxasa
Pingback: xwc34rwxrw34rwc34c
Pingback: click here
Pingback: news
Pingback: https://www.manytube.net/
Pingback: cbd gummies
Pingback: https://royalcbd.com/product/cbd-roll-on-gel/
Pingback: best cbd oil for pain
Pingback: 918kisslogin.app
Pingback: ky
Pingback: 메리트카지노 주소
Pingback: proven side effects
Pingback: steel bite pro oral health suport reviews
Pingback: 메리트카지노 주소
Pingback: sàn giao dịch forex uy tín
Pingback: canada pharmacy
Pingback: their usa website
Pingback: burnaby cash for cars
Pingback: surrey handyman
Pingback: casino
Pingback: my mega888 demo id
Pingback: Dwayne Olander
Pingback: wmdolls
Pingback: download mega888 ios download 2020
Pingback: Julian Di Benedetto
Pingback: THC Cartridge
Pingback: c34r54wxw4r34c3
Pingback: log in with your twitter account
Pingback: pawn shop Boston
Pingback: 인싸포커
Pingback: microgaming online malaysia
Pingback: t-shirt men
Pingback: phenq recensioni vere
Pingback: premium soy candles
Pingback: شركة كشف تسربات المياه بالاحساء
Pingback: cbd oil near me
Pingback: best cbd for dogs with anxiety
Pingback: best cbd oils
Pingback: cbd oil
Pingback: https://www.freitag.de/autoren/cmaier8/der-kleine-mann-im-aktienhandel
Pingback: ZTE
Pingback: Bitcoin Mining
Pingback: 강남 안마
Pingback: 강남 안마
Pingback: Cip Sia
Pingback: kratom tea
Pingback: renovation appartement paris
Pingback: online cigars
Pingback: best oven to cook pizza
Pingback: terrible massage bond street
Pingback: Телефонные кабели и провода связи
Pingback: skull ring handmade
Pingback: Metabolism
Pingback: bitcoin price
Pingback: 完全割引
Pingback: taxi from heathrow to brighton
Pingback: 샌즈카지노
Pingback: apply here for a payday loan
Pingback: Werden Bank
Pingback: delta 8 near me
Pingback: Trans Escorts London
Pingback: para kazanma
Pingback: read my site
Pingback: Read More
Pingback: check it
Pingback: damony
Pingback: read here
Pingback: best weight loss pills
Pingback: https://onlymp3.net/
Pingback: Viagra
Pingback: pg slot ทดลอง เล่น ฟรี 100
Pingback: become a merchant processor
Pingback: takipçi satın al
Pingback: Viagra bez recepty
Pingback: Recette facile
Pingback: a fantastic read
Pingback: how to sell credit card processing
Pingback: how to become a payment facilitator
Pingback: W88vnbet
Pingback: W88
Pingback: tips on selling merchant services
Pingback: computer equipment disposal
Pingback: computer recycling companies
Pingback: laptop recycling
Pingback: computer equipment recycling
Pingback: bitcoin multiply
Pingback: matka jodi fix
Pingback: بودات
Pingback: shagle
Pingback: slot online
Pingback: genting online casino malaysia
Pingback: Kamagra
Pingback: judi bola deposit
Pingback: Do it yourself security camera installation
Pingback: oranum.com
Pingback: computer equipment disposal services
Pingback: Sex movies mitrade
Pingback: ข่าวพรีเมียร์ลีค
Pingback: buy real Instagram likes
Pingback: free dating
Pingback: w88clubvip
Pingback: cbd gummies for sale
Pingback: băng keo
Pingback: Delta 8
Pingback: delta 8 THC
Pingback: #bestmeever
Pingback: foreclosure fraud
Pingback: student debt
Pingback: weed
Pingback: https://accentsecuritycompany.com/directions-instructing-ways-to-play-blackjack-on-line-produced-straightforward/
Pingback: marijuana dispensaries near me
Pingback: Seattle Weekly
Pingback: upcoming deals
Pingback: convex mirror indoor 24
Pingback: bladeless fan info
Pingback: how mesothelioma is formed
Pingback: Michael Wisniewski CT
Pingback: brighton taxi express
Pingback: social media copy
Pingback: Raag Consultants
Pingback: Primary Care
Pingback: لوشن جلسرين
Pingback: canada pharmacy canada pharmacy
Pingback: designer mens sneakers
Pingback: amazon prime gift ideas
Pingback: https://beegix.com/tags/three-girls
Pingback: https://ad.beegix.com/search/vu-p
Pingback: перевод денег карты мир
Pingback: mbet188
Pingback: g data antywirus 3pc
Pingback: keonhacai.com m88
Pingback: link bk8vn.com
Pingback: His Secret Obsession
Pingback: His Secret Obsession Reviews
Pingback: sites like ebay
Pingback: https://www.bartier.com.au/insights/articles/modern-slavery-reporting-the-clock-is-ticking/ or press release - https://www.bartier.com.au/insights/in-the-media/lack-of-clarity-may-hamper-aussie-companies-tackling-modern-slavery/
Pingback: Pat Mesiti
Pingback: Quiz
Pingback: Excavating company near me
Pingback: Painters Honolulu
Pingback: Bartier Perry
Pingback: satta matka
Pingback: bebe lutke za devojcice
Pingback: fix my credit for free
Pingback: Insurance
Pingback: bimbim.com
Pingback: Custom Software
Pingback: credit repair scams
Pingback: Is Real Estate Investment Trusts A Good Career Path
Pingback: Read Full Article
Pingback: computer disposal
Pingback: computers recycling company
Pingback: Office 365 Business Standard 5PC/MAC
Pingback: Albanian pedophile
Pingback: สมัครสล็อต
Pingback: spbo macau live score
Pingback: https://globaltimesng.com/2020/11/17/ariana-grande-makes-a-sex-doll-of-herself-in-new-video-for-3435/
Pingback: zobacz
Pingback: Microsoft Windows 8.1 Pro Oem
Pingback: สูตรสล็อต ฟรี
Pingback: corporate undercover investigators
Pingback: porady prawne dla przedsiębiorców
Pingback: how to create twitter moments
Pingback: experts in missing persons
Pingback: taxi service
Pingback: jak otrzymać rozwód kościelny
Pingback: vat oss
Pingback: terapia grupowa szczecin
Pingback: ซื้อหวยออนไลน์
Pingback: child custody investigation questions
Pingback: corporate theft investigator
Pingback: intellectual property investigations
Pingback: burlington wedding photography
Pingback: U.S. citizen missing abroad
Pingback: 마사지커뮤니티
Pingback: taxi booking
Pingback: Pride of East Africa
Pingback: Womply Payout
Pingback: pg slot
Pingback: fence replacement San Jose
Pingback: File ITR Income Tax Return Dumka
Pingback: redirected here
Pingback: bienes raices en florida
Pingback: 폰테크
Pingback: Wholesale Vape Juices Code
Pingback: high blood pressure
Pingback: cleaning company dubai
Pingback: visit our website
Pingback: pozycjonowanie
Pingback: sprawdz moj blog
Pingback: Saint Louis concrete company
Pingback: http://krajowy.biz