Koje su opasnosti nepouzdanog USB pogona?

Sadržaj:

Koje su opasnosti nepouzdanog USB pogona?
Koje su opasnosti nepouzdanog USB pogona?

Video: Koje su opasnosti nepouzdanog USB pogona?

Video: Koje su opasnosti nepouzdanog USB pogona?
Video: THE SMARTEST WAY TO FIND CUSTOMERS FOR EXPORT | Grow Your International Business with TENDATA - YouTube 2024, Svibanj
Anonim
Korištenje pouzdanih USB pogona koje posjedujete u svom ažuriranom, dobro osiguranom operacijskom sustavu je jedna stvar, ali što ako vaš najbolji prijatelj prestane sa svojim USB pogonom i želi da kopirate neke datoteke? Je li vaš USB prijenosnik vašeg prijatelja podložan bilo kakvim rizicima za vaš dobro osigurani sustav ili je li to samo besmisleni strah?
Korištenje pouzdanih USB pogona koje posjedujete u svom ažuriranom, dobro osiguranom operacijskom sustavu je jedna stvar, ali što ako vaš najbolji prijatelj prestane sa svojim USB pogonom i želi da kopirate neke datoteke? Je li vaš USB prijenosnik vašeg prijatelja podložan bilo kakvim rizicima za vaš dobro osigurani sustav ili je li to samo besmisleni strah?

Današnja pitanja o pitanjima i odgovorima daju nam zahvaljujući SuperUser, podjela Škole razmjene, zajednice-driven grupiranje Q & A web stranica.

Slika ljubaznošću Wikimedije Commons.

Pitanje

Čitač SuperUser E M želi znati koje su opasnosti nepouzdanog USB pogona:

Suppose someone wants me to copy some files to their USB drive. I’m running fully-patched Windows 7 x64 with AutoRun disabled (via Group Policy). I insert the USB drive, open it in Windows Explorer, and copy some files to it. I do not run or view any of the existing files. What bad things could happen if I do this?

What about if I do this in Linux (say, Ubuntu)? Please note that I’m looking for details of specific risks (if any), not “it would be safer if you don’t do this”.

Ako imate sustav koji je ažuriran i dobro osiguran, postoje li rizici od nepouzdanog USB pogona ako ste ga samo priključili i kopirali datoteke, ali nemojte ništa učiniti?

Odgovor

Za nas su odgovorili SuperUser suradnici sylvainulg, steve i Zan Lynx. Prvo gore, sylvainulg:

Less impressively, your GUI file browser will typically explore files to create thumbnails. Any pdf-based, ttf-based, (insert Turing-capable file type here)-based exploit that works on your system could potentially be launched passively by dropping the file and waiting for it to be scanned by the thumbnail renderer. Most of the exploits I know about are for Windows though, but do not underestimate the updates for libjpeg.

Slijedi steve:

There are several security packages that allow me to set up an AutoRun script for either Linux OR Windows, automatically executing my malware as soon as you plug it in. It is best not to plug in devices that you do not trust!

Bear in mind, I can attach malicious software to pretty much any sort of executable that I want, and for pretty much any OS. With AutoRun disabled you SHOULD be safe, but AGAIN, I don’t trust devices that I am even the slightest bit skeptical about.

For an example of what can do this, check out The Social-Engineer Toolkit (SET).

The ONLY way to truly be safe is to boot up a live Linux distribution with your hard drive unplugged, mount the USB drive, and take a look. Other than that, you’re rolling the dice.

As suggested by others, it is a must that you disable networking. It doesn’t help if your hard drive is safe and your whole network gets compromised.

I naš konačni odgovor Zan Lynxa:

Another danger is that Linux will try to mount anything (joke suppressed here).

Some of the file system drivers are not bug free. Which means that a hacker could potentially find a bug in, say, squashfs, minix, befs, cramfs, or udf. Then the hacker could create a file system that exploits the bug to take over a Linux kernel and put that on a USB drive.

This could theoretically happen to Windows as well. A bug in the FAT, NTFS, CDFS, or UDF driver could open up Windows to a takeover.

Kao što možete vidjeti iz gore navedenih odgovora, uvijek postoji mogućnost rizika za sigurnost vašeg sustava, ali ovisi o tome tko (ili što) ima pristup dotičnom USB pogonu.

Imate li nešto za objašnjenje? Zvuči u komentarima. Želite li pročitati više odgovora od drugih tehnoloških korisnika Stack Exchangea? Pogledajte ovdje cijelu raspravu.

Preporučeni: