PwnPlug is a tiny Linux-based computer disguised as an innocent power charger plug, which can quietly violate corporate networks when plugged into a company power socket.
The device, manufactured by a Vermont startup named Pwnie Express, comes pre-loaded with an arsenal of hacking tools and has the ability to communicate information to its owner via 3G. According to network security specialists, it works almost too well, creating risks for companyes – although Pwnie Express says it is only selling it for remote network penetration testing (pentesting).
Pwnie Express calls the device “the industry’s first-to-market commercial penetration testing drop box”. Pentesting finds network vulnerabilities by asking a “white hat” hacker to attempt breaking into the network. It safeguards organisations against failure by identifying security weak spots so that they may be managed proactively.
PwnPlug is a stealthy, non-descript white brick that can be disguised as a power supply, charger or an electric air freshener. It comes together with a choice of stickers to complete the illusion. Since the device needs to be installed at a target location first, an element of “social engineering” is necessary for a successful attack.
Wired reported a network specialist Jayson E. Street turned up at several national banks in the US dressed as a technician, while conducting security testing on behalf of the management. He was planning to test 10 branches, but after he was allowed to plug in the PwnPlug, unchallenged, in four, the exercise was called off. According to Pwnie Express, PwnPlug is now used by several Fortune 50 companies and even some government organisations to check their networks for vulnerabilities.
You can watch a video documenting Jayson’s exploits on Irongeek website.
PwnPlug costs $520 (£329) for the standard version, and $770 (£487) for the Elite version, which can connect over the 3G mobile wireless network. Both maintain a covert, encrypted, firewall-busting backdoor into a target network. If the user already owns a SheevaPlug, he or she can download the community edition of PwnPlug software to start hacking, or testing, free of charge.
Inside the PwnPlug, users will find a 1.2GHz Marvell Sheeva CPU with 512 MB of flash memory and 512 MB of DDR2, supporting Debian, Fedora, FreeBSD, and OpenWRT ARM Linux distributions. On the outside of the case, the system has an Ethernet port, a USB connector and a serial console port. The in-built memory can be expended through an SD card slot. The power consumption of the system is stealthy too – 2.3 watts while idle, and seven watts under load.
PwnPlug includes a “Plug UI” for simple web-based setup. It is able to easily tunnel through application-aware firewalls & IPS, and features fully-automated NAC/802.1x/RADIUS bypass. It can even send tunnel status alerts by SMS, giving the hacker up-to-the-minute information about their target.
The company also offers a PwnPhone, which too is capable of full-scale wireless penetration testing. As with Pwn Plug, if you already own or can acquire a Nokia N900 you can download the community edition of Pwn Phone and get after it right away.
Could you survive a PwnPlug attack? Try our security quiz and find out!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…
View Comments
Companies should be careful. These "simple to use" devices can be easily misused by internal employees even without specific security knowledge or experience and cause leakage of sensitive information. Proper vulnerability management, device control, incident and event management should be always in place.
Companies should be careful when dealing with devices like this. It may become to easy for internal employee to publish sensitive information or gain privileged access.