Use a Wireless Xbox 360 Controller with your Raspberry Pi #piday #raspberrypi @Raspberry_Pi
From Raspberry Pi Tutorials:
In addition to the control of the Raspberry Pi via infrared remote controls,433 Mhz transmitter, messengers and many more, also a wireless Xbox 360 controller can be read from the Raspberry Pi. This allows the gamepad to be used as an external mouse (in desktop mode) or in scripts and thus the GPIOs can be controlled. In RetroPie, the Xbox Controller can also be used as input media for games on the Raspberry Pi.
This $5 Device Can Take Over a Computer—Even If It’s Locked #piday #raspberrypi @Raspberry_Pi
PoisonTap from Samy Kamkar has set the internet abuzz with it’s hacking abilities. If you want to learn more about turning your Pi Zero into a USB Gadget, check out our learn guide here. From Gizmodo.
Samy Kamkar just released his latest hacking cre ation, and it is terrifying. Dubbed “Poison Tap,” Kamkar’s new home brew device allows someone to plant a backdoor on a computer in just one minute, even when the device is locked.
Kamkar’s method for installing the backdoor is unconventional and totally ingenious. Poison Tap targets the victim’s browser cache and injects the malicious code there. Traditionally, attacks would attempt to install malware onto the computer, but by instead going after the browser cache, Poison Tap can bypass some security measures and anti-virus software.
Poison Tap’s software runs off of a a microSD card inserted into a $5 Raspberry Pi. Once it is plugged in, Poison Tap acts as if it was Ethernet to USB device and its setting make it so that the computer begins to send network traffic to Poision Tap, hijacking all network traffic. From there, it “siphons and stores” cookies and session from the web browser of just about every website. Then Poison Tap gains access to the computer’s internal router, and it’s game over. An attacker can now remotely send code to the victim’s computer via the web. Once Poison Tap is unplugged, the backdoor stays on the computer, allowing an attacker essentially unmitigated access to the victim’s computer.
You must be logged in to post a comment.