VnutZ Domain
Copyright © 1996 - 2024 [Matthew Vea] - All Rights Reserved

2007-12-07
Featured Article

Snooping Wireless Keyboards

[index] [3,125 page views]
Tagged As: Hacking, Privacy, and Security

TEMPEST attacks represent the state of the art trade craft for reconstructing a user's computing session from afar. Often times, the act is much simpler. While obtaining passwords, financial information or logging messages can be done via advanced TEMPEST tricks or sniffing network traffic, it's actually much simpler to log the activity directly from the keyboard. This can be done with keystroke logging software or even an in-line logging dongle. However, these days, many people have begun using wireless keyboards and mice which makes the process extraordinarily easy for snooping. Security researchers discovered "encryption" consisted of XOR'ing a single byte and deciphering the keystrokes involved a simple brute force algorithm against the 256 possible bytes used as a key. The attack was successful against most popular wireless implementations although researchers noted that Bluetooth connections actually had "real" encryption so long as the manufacturer used it.



More site content that might interest you:

It's almost like the movies ... where the thieves have a hacker that can reroute all the traffic to facilitate their getaway.


Try your hand at fate and use the site's continuously updating statistical analysis of the MegaMillions and PowerBall lotteries to choose "smarter" number. Remember, you don't have to win the jackpot to win money from the lottery!


Tired of social media sites mining all your data? Try a private, auto-deleting message bulletin board.


paypal coinbase marcus