Rickmote: Rickrolling Chromecast users

The Raspberry Pi is a favourite tool of security researchers, and we’ve seen a number of demonstrations of how important it is to secure your devices against attack that use it. (I got stopped in the queue for the cinema last week by someone who recognised me from this blog, and has been working in penetration testing with the Pi for a couple of years; the conversation I had with him was much more fun┬áthan the movie turned out to be.) Bugs in commercial software are open to exploits, and I have yet to see an exploit more enjoyable than this one, which takes advantage of a bug in the way Chromecast recognises wifi. Under normal use, the Chromecast can be sent a deauth command that disconnects it from wifi.

Visit link:
Rickmote: Rickrolling Chromecast users

Share
,

Parse error: syntax error, unexpected 'new' (T_NEW) in /homepages/2/d253654631/htdocs/crazy4pi/wp-content/plugins/autoblogged/simplepie.php on line 720

Warning: Use of undefined constant PEAR_LOG_WARNING - assumed 'PEAR_LOG_WARNING' (this will throw an Error in a future version of PHP) in /homepages/2/d253654631/htdocs/crazy4pi/wp-content/plugins/autoblogged/autoblogged.php on line 186

Parse error: syntax error, unexpected 'new' (T_NEW) in /homepages/2/d253654631/htdocs/crazy4pi/wp-content/plugins/autoblogged/Log.php on line 168

Fatal error: Exception thrown without a stack frame in Unknown on line 0