The Raspberry Pi has proven to be a useful tool for security researchers once again. This time, the Chromecast has been exploited, having found an interesting bug that lets you take control of any TV using the device.
From a techy point of view, the Chromecast uses a ‘deauth’ command that disconnects it from the Wi-Fi network. However, the command has been proven to have a bug. Once the command is initialized, it is said to kick the device off the network and enters a config mode that lets it become a Wi-Fi hotspot. When the Chromecast is in this state, anyone connecting to it can then send any video they like to the TV hosting the Chromecast device.
In short, the Chromecast can become a hijackable device that lest anyone connecting to it stream any video they like to it. The bug is said to have been discovered by Dan Petro, a whitehat at security consultancy Bishop Fox. He is said to have used a Raspberry Pi, a couple of Wi-Fi cards and a touchscreen, along with Aircrack to take advantage of the bug. The device is said to take about 30 seconds to connect and take over the network. Once inside, people can then Rickroll their Chromecast friends or neighbors.
Petro has apparently made a blog about his invention as well, helping people build their own and set them on a ‘rolling’ spree. More information about the RickMote and can be found here. Also, below is a video of Petro’s presentation regarding his findings.
Thank you Raspberry Pi for providing us with this information
According to a new report, the GeForce RTX 5090 GPU will be very expensive. It…
A new AMD processor in the form of an engineering model has been leaked in…
SK Hynix has claimed to be the first company to mass-produce 321-layer NAND memory chips.…
SOUNDS GREAT – Full stereo sound (12W peak power) gives your setup a booming audio…
Special Edition Yoshi design Ergonomic controller shape with Nintendo Switch button layout Detachable 10ft (3m)…
Fluid Motion: These flight rudder pedals are smooth and accurate that enable precise control over…