<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Sterling login credentials from a locked PC or Mac just got easier &#124; Ars Technica</title>
	<atom:link href="http://www.epanorama.net/blog/2016/09/08/sterling-login-credentials-from-a-locked-pc-or-mac-just-got-easier-ars-technica/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/09/08/sterling-login-credentials-from-a-locked-pc-or-mac-just-got-easier-ars-technica/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 05 Apr 2026 18:35:45 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/09/08/sterling-login-credentials-from-a-locked-pc-or-mac-just-got-easier-ars-technica/comment-page-1/#comment-1511903</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 08 Sep 2016 19:41:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=46765#comment-1511903</guid>
		<description><![CDATA[USB credential stealing while screen is locked
https://www.youtube.com/watch?v=Oplubg5q7ao]]></description>
		<content:encoded><![CDATA[<p>USB credential stealing while screen is locked<br />
<a href="https://www.youtube.com/watch?v=Oplubg5q7ao" rel="nofollow">https://www.youtube.com/watch?v=Oplubg5q7ao</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/09/08/sterling-login-credentials-from-a-locked-pc-or-mac-just-got-easier-ars-technica/comment-page-1/#comment-1511902</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 08 Sep 2016 19:40:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=46765#comment-1511902</guid>
		<description><![CDATA[Snagging creds from locked machines
https://room362.com/post/2016/snagging-creds-from-locked-machines/

Thesis:

If I plug in a device that masquerades as a USB Ethernet adapter and has a computer on the other end, can I capture credentials from a system, even when locked out (yes, logged in, just locked). (..or do even more, but we’ll save that for another time, this post is already too long)

Tested on:

Windows 98 SE
Windows 2000 SP4
Windows XP SP3
Windows 7 SP1
Windows 10 (Enterprise and Home)
OSX El Capitan / Mavericks (I was able to get creds on both of these but I’m still testing to see if it was a fluke, or my own configurations)
I still have not tested on Linux, I will make a new post on if that works. 

Why does this work?

Because USB is Plug-and-Play. This means that even if a system is locked out, the device still gets installed. Now, I believe there are restrictions on what types of devices are allowed to install at a locked out state on newer operating systems (Win10/El Capitan), but Ethernet/LAN is definitely on the white list.
Computers are constantly creating traffic, even if you don’t have any browsers or applications open, and most computers trust their local network for some reason (I know the technical bits on ‘why’, just complaining…)
Network preference when there are more than gateway or network connection is based on “metrics” on Windows and a combination of metrics and “preference” on OSX, but by default “wired” and “newer/faster” always win out.
This means that by plugging in the device it quickly becomes the gateway, DNS server, WPAD server and others thanks to Responder.

The average time for freshly inserted into a locked workstation and by the time I have creds is about 13 seconds, all depends on the system. Some addition setup I used inotify to watch for a file change in the Responder.db database and shutdown the Armory. This helps finalize file writes as well and giving me an indicator via the LED that creds were obtained.]]></description>
		<content:encoded><![CDATA[<p>Snagging creds from locked machines<br />
<a href="https://room362.com/post/2016/snagging-creds-from-locked-machines/" rel="nofollow">https://room362.com/post/2016/snagging-creds-from-locked-machines/</a></p>
<p>Thesis:</p>
<p>If I plug in a device that masquerades as a USB Ethernet adapter and has a computer on the other end, can I capture credentials from a system, even when locked out (yes, logged in, just locked). (..or do even more, but we’ll save that for another time, this post is already too long)</p>
<p>Tested on:</p>
<p>Windows 98 SE<br />
Windows 2000 SP4<br />
Windows XP SP3<br />
Windows 7 SP1<br />
Windows 10 (Enterprise and Home)<br />
OSX El Capitan / Mavericks (I was able to get creds on both of these but I’m still testing to see if it was a fluke, or my own configurations)<br />
I still have not tested on Linux, I will make a new post on if that works. </p>
<p>Why does this work?</p>
<p>Because USB is Plug-and-Play. This means that even if a system is locked out, the device still gets installed. Now, I believe there are restrictions on what types of devices are allowed to install at a locked out state on newer operating systems (Win10/El Capitan), but Ethernet/LAN is definitely on the white list.<br />
Computers are constantly creating traffic, even if you don’t have any browsers or applications open, and most computers trust their local network for some reason (I know the technical bits on ‘why’, just complaining…)<br />
Network preference when there are more than gateway or network connection is based on “metrics” on Windows and a combination of metrics and “preference” on OSX, but by default “wired” and “newer/faster” always win out.<br />
This means that by plugging in the device it quickly becomes the gateway, DNS server, WPAD server and others thanks to Responder.</p>
<p>The average time for freshly inserted into a locked workstation and by the time I have creds is about 13 seconds, all depends on the system. Some addition setup I used inotify to watch for a file change in the Responder.db database and shutdown the Armory. This helps finalize file writes as well and giving me an indicator via the LED that creds were obtained.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/09/08/sterling-login-credentials-from-a-locked-pc-or-mac-just-got-easier-ars-technica/comment-page-1/#comment-1511901</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 08 Sep 2016 19:38:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=46765#comment-1511901</guid>
		<description><![CDATA[Attack works because computers trust PnP devices
The attack is possible because most computers will automatically install any plug-and-play (PnP) USB device.

&quot;Why does this work? Because USB is Plug-and-Play. This means that even if a system is locked out, the device still gets installed,&quot; Fuller wrote on his blog yesterday.

&quot;Now, I believe there are restrictions on what types of devices are allowed to install at a locked out state on newer operating systems (Win10/El Capitan), but Ethernet/LAN is definitely on the white list.&quot;



Read more: http://news.softpedia.com/news/modified-usb-ethernet-adapter-can-steal-windows-and-mac-credentials-508034.shtml#ixzz4Jh9UIn2v]]></description>
		<content:encoded><![CDATA[<p>Attack works because computers trust PnP devices<br />
The attack is possible because most computers will automatically install any plug-and-play (PnP) USB device.</p>
<p>&#8220;Why does this work? Because USB is Plug-and-Play. This means that even if a system is locked out, the device still gets installed,&#8221; Fuller wrote on his blog yesterday.</p>
<p>&#8220;Now, I believe there are restrictions on what types of devices are allowed to install at a locked out state on newer operating systems (Win10/El Capitan), but Ethernet/LAN is definitely on the white list.&#8221;</p>
<p>Read more: <a href="http://news.softpedia.com/news/modified-usb-ethernet-adapter-can-steal-windows-and-mac-credentials-508034.shtml#ixzz4Jh9UIn2v" rel="nofollow">http://news.softpedia.com/news/modified-usb-ethernet-adapter-can-steal-windows-and-mac-credentials-508034.shtml#ixzz4Jh9UIn2v</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/09/08/sterling-login-credentials-from-a-locked-pc-or-mac-just-got-easier-ars-technica/comment-page-1/#comment-1511900</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 08 Sep 2016 19:38:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=46765#comment-1511900</guid>
		<description><![CDATA[Modified USB Ethernet Adapter Can Steal Windows and Mac Credentials
Possibly Linux creds too, but yet untested

Read more: http://news.softpedia.com/news/modified-usb-ethernet-adapter-can-steal-windows-and-mac-credentials-508034.shtml#ixzz4Jh9Muczh]]></description>
		<content:encoded><![CDATA[<p>Modified USB Ethernet Adapter Can Steal Windows and Mac Credentials<br />
Possibly Linux creds too, but yet untested</p>
<p>Read more: <a href="http://news.softpedia.com/news/modified-usb-ethernet-adapter-can-steal-windows-and-mac-credentials-508034.shtml#ixzz4Jh9Muczh" rel="nofollow">http://news.softpedia.com/news/modified-usb-ethernet-adapter-can-steal-windows-and-mac-credentials-508034.shtml#ixzz4Jh9Muczh</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
