{"id":5934,"date":"2016-09-19T09:23:47","date_gmt":"2016-09-19T07:23:47","guid":{"rendered":"http:\/\/inprosec.com\/an-usb-is-all-you-need-to-steal-a-computer-password\/"},"modified":"2016-09-19T09:23:47","modified_gmt":"2016-09-19T07:23:47","slug":"an-usb-is-all-you-need-to-steal-a-computer-password","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/","title":{"rendered":"An USB is all you need to steal a Computer password"},"content":{"rendered":"<p style=\"text-align: justify;\">The Information Security standards dictate us that it is mandatory to\u00a0have a password enabled on your computer, a measure that we know is not 100% sure but it helps to have an extra layer to protect our information. Many users often\u00a0block the computer\u00a0when they are about leave\u00a0temporarily and\u00a0the session is still open. It has been found that it is possible to remove the access credentials with a simply device<\/p>\n<p style=\"text-align: justify;\">Rob Fuller, an engineer for R5 Industries found that operating systems like Windows and Mac OS are prone\u00a0to credential theft when they are blocked with active sessions, because the computer keeps many process assets where the hash or digital signature of the user is registered, including network connection.<\/p>\n<p style=\"text-align: justify;\">All you\u00a0need is to connect an USB device for a few seconds in order to violate the hash and store in the device, which then serve to access other services &#8220;protected&#8221; where network services are included. His theory is based on the demonstration made through USB Armory, which must be programmed to simulate be a USB LAN to Ethernet adapter so that it will become the primary network interface on the computer you want to hack.<\/p>\n<p style=\"text-align: justify;\">With this, the attacker will control the network configuration, which will give access to DNS, configuring proxies, among other things, but most important is that it allows to intercept and manipulate all network traffic that occurs on the computer &#8220;locked&#8221;.<\/p>\n<p style=\"text-align: justify;\">Source: <a href=\"http:\/\/www.xataka.com\/seguridad\/un-dispositivo-usb-es-todo-lo-que-se-necesita-para-robar-contrasenas-de-un-ordenador\">Xataka<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Information Security standards dictate us that it is mandatory to\u00a0have a password enabled on your computer, a measure that we know is not 100% sure but it helps to have an extra layer to protect our information. Many users often\u00a0block the computer\u00a0when they are about leave\u00a0temporarily and\u00a0the session is still open. It has been&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-5934","post","type-post","status-publish","format-standard","hentry","category-general"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>An USB is all you need to steal a Computer password - Inprosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An USB is all you need to steal a Computer password\" \/>\n<meta property=\"og:description\" content=\"The Information Security standards dictate us that it is mandatory to\u00a0have a password enabled on your computer, a measure that we know is not 100% sure but it helps to have an extra layer to protect our information. Many users often\u00a0block the computer\u00a0when they are about leave\u00a0temporarily and\u00a0the session is still open. It has been...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-19T07:23:47+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/an-usb-is-all-you-need-to-steal-a-computer-password\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/an-usb-is-all-you-need-to-steal-a-computer-password\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/5b5899cc2de44dac734f58620c63035c\"},\"headline\":\"An USB is all you need to steal a Computer password\",\"datePublished\":\"2016-09-19T07:23:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/an-usb-is-all-you-need-to-steal-a-computer-password\\\/\"},\"wordCount\":252,\"commentCount\":0,\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/an-usb-is-all-you-need-to-steal-a-computer-password\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/an-usb-is-all-you-need-to-steal-a-computer-password\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/an-usb-is-all-you-need-to-steal-a-computer-password\\\/\",\"name\":\"An USB is all you need to steal a Computer password - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"datePublished\":\"2016-09-19T07:23:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/5b5899cc2de44dac734f58620c63035c\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/an-usb-is-all-you-need-to-steal-a-computer-password\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/an-usb-is-all-you-need-to-steal-a-computer-password\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/an-usb-is-all-you-need-to-steal-a-computer-password\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An USB is all you need to steal a Computer password\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/5b5899cc2de44dac734f58620c63035c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"An USB is all you need to steal a Computer password - Inprosec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/","og_locale":"en_US","og_type":"article","og_title":"An USB is all you need to steal a Computer password","og_description":"The Information Security standards dictate us that it is mandatory to\u00a0have a password enabled on your computer, a measure that we know is not 100% sure but it helps to have an extra layer to protect our information. Many users often\u00a0block the computer\u00a0when they are about leave\u00a0temporarily and\u00a0the session is still open. It has been...","og_url":"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/","og_site_name":"Inprosec","article_published_time":"2016-09-19T07:23:47+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/"},"author":{"name":"admin","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/5b5899cc2de44dac734f58620c63035c"},"headline":"An USB is all you need to steal a Computer password","datePublished":"2016-09-19T07:23:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/"},"wordCount":252,"commentCount":0,"articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/","url":"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/","name":"An USB is all you need to steal a Computer password - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"datePublished":"2016-09-19T07:23:47+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/5b5899cc2de44dac734f58620c63035c"},"breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/an-usb-is-all-you-need-to-steal-a-computer-password\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"An USB is all you need to steal a Computer password"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/5b5899cc2de44dac734f58620c63035c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/5934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=5934"}],"version-history":[{"count":0,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/5934\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=5934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=5934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=5934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}