wireless-keyboard-keyloggerWireless Keyboards are getting popular day by day due to the convenience offered by them. But the data transmitted by them is always susceptible to sniffing and people have been working on methods to catch the data transmitted by these Wireless Keyboards for the purpose of keylogging.

The data transmitted by a wireless keyboard fade considerably after a distance of about 10 meters and it gives a sense of security to the user. But the fact is that powerful receive antenae can easily catch these signals beyond that distance and this makes the use of wireless keyboards susceptible to wireless keylogging.

Way back in 2007, a small swiss firm had been able to break the encryption code of Wireless Optical Desktop 1000/2000 keyboards. Now the same firm, in collaboration with remote-exploit.org, has announced the development of a remote keyboard keylogging device, which can snife and interpret the keystrokes of a wireless keyboard.The present version requires the device to be placed in close proximity to the wireless keyboard, but who knows that soon they will be able to catch the signals of a wireless keyboard from a distant place also.

Now 1.5 years after releasing our whitepaper “27Mhz Wireless Keyboard Analysis Report” about wireless keyboard insecurities, we are proud to present the universal wireless keyboard sniffer: Keykeriki. This opensource hardware and software project enables every person to verify the security level of their own keyboard transmissions, and/or demonstrate the sniffing attacks (for educational purpose only). The hardware itself is designed to be small and versatile, it can be extended to currently undetected/unknown keyboard traffic, and/or hardware extensions, for example, a repeating module or amplifier.

Features of this Wireless Keyboard Keylogger:

  • Radio frequency channel switching
  • Signal strenght (RSSI) display
  • Data logging to SDCard
  • Dumping content of SDCard to terminal
  • Encryption key handling
  • On-the-fly deciphering of Microsoft’s XOR based encryption
  • Hardware signal filter state configuration
  • Feature state configuration incl. persistent storage
  • Activation and usage of backpack USART interface
  • Sniffing and decoding of keystrokes of Microsoft 27Mhz based keyboards

Check it here.