The Raspberry Pi has proven to be a useful tool for security researchers once again. This time, the Chromecast has been exploited, having found an interesting bug that lets you take control of any TV using the device.
From a techy point of view, the Chromecast uses a ‘deauth’ command that disconnects it from the Wi-Fi network. However, the command has been proven to have a bug. Once the command is initialized, it is said to kick the device off the network and enters a config mode that lets it become a Wi-Fi hotspot. When the Chromecast is in this state, anyone connecting to it can then send any video they like to the TV hosting the Chromecast device.
In short, the Chromecast can become a hijackable device that lest anyone connecting to it stream any video they like to it. The bug is said to have been discovered by Dan Petro, a whitehat at security consultancy Bishop Fox. He is said to have used a Raspberry Pi, a couple of Wi-Fi cards and a touchscreen, along with Aircrack to take advantage of the bug. The device is said to take about 30 seconds to connect and take over the network. Once inside, people can then Rickroll their Chromecast friends or neighbors.
Petro has apparently made a blog about his invention as well, helping people build their own and set them on a ‘rolling’ spree. More information about the RickMote and can be found here. Also, below is a video of Petro’s presentation regarding his findings.
Thank you Raspberry Pi for providing us with this information