"Keykeriki" - Dreamlab Technologies and remote-exploit.org develop the first open 27Mhz wireless keyboard sniffer

It sniffs and records the signal of wireless keyboards and demonstrates their security risk level / And it can be used to demonstrate hacking-attacks for educational purpose

(PresseBox) ( Bern, )
Wireless keyboards are very popular in many offices and private homes. Even in the front office section of banks, they are frequently used. But they represent a big security risk - as dreamlab technologies already pointed out in a white paper published 2007. Wireless keyboards are risky, because they transmit a radio signal that is not enough protected. The newly developed portable universal receiver sniffs and records the signal of wireless keyboards and demonstrates their security risk level. The keykeriki-software and construction plans for -hardware are freely available online [www.remote-exploit.org].

Hardware

The hardware needs to be portable and small and to be able to adapt to future needs. Keykeriki is therefore built around a Texas Instruments TRF7900 chip controlled by an ATMEL ATMEGA microcontroller. For logging abilities an SDCard-interface is built into the board layout, as well as an additional USART channel for future hardware extensions ("backpacks"). The whole board can be powered directly via the USB-bus or a stable 5Vpower source. When connected to a computer's USB-port, one can use either a decent terminal application or the keykeriCTL software which is included in the software package of this project. All the schematics can be downloaded in eagle- and PDF-format as part of the project's software package. Fully equipped boards will be provided in the near future.

Software

Because of the flexible hardware design, most features can be built in by software. This first release contains (among other features) radio frequency switching, signal strength display, deciphering of encryptions, sniffing and decoding of keystrokes of Microsoft 27Mhz based keyboards.

Extensions

Hardware extensions are easy to realize because two different interfaces, a second USART, I²C/TWI and SPI, are externalized. Therefore so called Backpacks e. g. an LCD display controller can be connected using the USART Interface.

The Future

Future extensions include amplification for antennas, support of other Microsoft keyboards and products of other producers, the constant amelioration of hard- and software and the parallel handling of several keyboards. Furthermore, a keykeriki able to send mouse- and keyboard-signals is intended.

Technical details can be found online: www.remote-exploit.org.
Für die oben stehenden Pressemitteilungen, das angezeigte Event bzw. das Stellenangebot sowie für das angezeigte Bild- und Tonmaterial ist allein der jeweils angegebene Herausgeber (siehe Firmeninfo bei Klick auf Bild/Meldungstitel oder Firmeninfo rechte Spalte) verantwortlich. Dieser ist in der Regel auch Urheber der Pressetexte sowie der angehängten Bild-, Ton- und Informationsmaterialien.
Die Nutzung von hier veröffentlichten Informationen zur Eigeninformation und redaktionellen Weiterverarbeitung ist in der Regel kostenfrei. Bitte klären Sie vor einer Weiterverwendung urheberrechtliche Fragen mit dem angegebenen Herausgeber. Bei Veröffentlichung senden Sie bitte ein Belegexemplar an service@pressebox.de.