October 2nd, 2014

Keyboard Sniffing

We talked about this before, and since it’s a pretty interesting project I thought it would be good to follow up on. The remote-exploit.org guys (responsible for backtrack) released a how-to along with source-code and parts list, etc, for their wireless keyboard sniffing project. They don’t have fabricated boards yet, but they’re looking at some options for the future. The hardware is based on a Texas Instruments TRF7900 chip controlled by an ATMEL ATMEGA microcontroller. Here’s the blurb they have on the site:

This opensource hardware and software project enables every person to verify the security level of their own keyboard transmissions, and/or demonstrate the sniffing attacks (for educational purpose only). The hardware itself is designed to be small and versatile, it can be extended to currently undetected/unknown keyboard traffic, and/or hardware extensions, for example, a repeating module or amplifier

Here’s a video that they posted of the sniffer in use:

Keyboard Sniffer Keykeriki from Max Moser on Vimeo.

Leave a Response

Imhotep theme designed by Chris Lin. Proudly powered by Wordpress.
XHTML | CSS | RSS | Comments RSS