Warning: mysql_real_escape_string(): Access denied for user ''@'localhost' (using password: NO) in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806

Warning: mysql_real_escape_string(): A link to the server could not be established in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806

Warning: mysql_real_escape_string(): Access denied for user ''@'localhost' (using password: NO) in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806

Warning: mysql_real_escape_string(): A link to the server could not be established in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806

Warning: mysql_real_escape_string(): Access denied for user ''@'localhost' (using password: NO) in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806

Warning: mysql_real_escape_string(): A link to the server could not be established in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806

Warning: mysql_real_escape_string(): Access denied for user ''@'localhost' (using password: NO) in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806

Warning: mysql_real_escape_string(): A link to the server could not be established in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806

Warning: mysql_real_escape_string(): Access denied for user ''@'localhost' (using password: NO) in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806

Warning: mysql_real_escape_string(): A link to the server could not be established in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806

Warning: mysql_real_escape_string(): Access denied for user ''@'localhost' (using password: NO) in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806

Warning: mysql_real_escape_string(): A link to the server could not be established in /home/acil/public_html/blog/wp-content/plugins/statpress-reloaded/statpress.php on line 1806
Keykeriki, Keylogger untuk wireless keyboard
Wednesday, June 17th, 2009 | Author:

Keykeriki Logo

Keykeriki Logo

Amankah menggunakan wireless keyboard? Jawabannya mungkin tidak. Karena transmisi antara keyboard dan receiver kini bisa disadap dan setiap tombol yang ditekan bisa terlihat. Peneliti keamanan dari Remote-Exploit.org yang bernama Thorsten Schroeder dan Max Moser (Dreamlab Technologies AG) telah berhasil menciptakan alat penyadap Wireless keyboard bernama Keykeriki. Keykeriki merupakan perangkat yang terdiri dari hardware dan software yang bersifat open source.

Keykeriki berukuran cukup kecil sehingga bisa dimasukan pada saku, ukuran Keykeriki setengah dari receiver wireless keyboard dari Microsoft. Data yang berhasil terekam oleh keykiri tersimpan dalam sebuah SD Card memory, dan tersimpan dalam bentuk plain text. Kemudian data bisa dilihat melalui layar LCD atau komputer menggunakan kabel USB bahkan bisa dikirim melalui SMS atau GPRS.

Keykeriki hardware

Keykeriki hardware

“Now 1.5 years after releasing our whitepaper “27Mhz Wireless Keyboard Analysis Report” about wireless keyboard insecurities, we are proud to present the universal wireless keyboard sniffer: Keykeriki. This opensource hardware and software project enables every person to verify the security level of their own keyboard transmissions, and/or demonstrate the sniffing attacks (for educational purpose only). The hardware itself is designed to be small and versatile, it can be extended to currently undetected/unknown keyboard traffic, and/or hardware extensions, for example, a repeating module or amplifier.”

Sebenarnya project ini merupakan realisasi dari laporan satu setengah tahun yang lalu. Saat ini Keykeriki bisa menyadap Microsoft wireless keyboard yang bekerja pada frekuensi 27Mhz. Sebenarnya transmisi yang terjadi antara wireless keyboard dan receiver dalam bentuk yang terenkripsi, namun Keykeriki mempunyai kemampuan untuk mendapatkan kunci enkripsi dan kemudian membuka enkripsi dan menuliskan hasilnya pada SD Card Memory. Walau telah berhasil menciptakan keylogger / penyadap untuk wireless keyboard 27Mhz namun hacker tersebut masih ingin terus mengembangkan Keykeriki. Dalam versi selanjutnya Keykeriki akan mempunyai kemampuan keystroke injection dan mampu bekerja pada frekuensi 2.4Ghz.

Apakah artinya menggunakan kabel yang tersambung pada komputer lebih aman? Jawabannya tidak juga, karena hardware keylogger untuk keyboard yang tersambung pada komputer sudah lama tersedia.

Video demontrasi hacking wireless keyboard:

http://vimeo.com/4990390

Referensi:
http://remote-exploit.org/Keykeriki.html
http://remote-exploit.org/hardhack/keykeriki_ph7d9.pdf

Sumber: http://cenary.com/keykeriki-keylogger-untuk-wireless-keyboard.html#more-795

Possibly Related Posts:


Category: ICT
You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
  1. Pertamax gan..
    btw oke juga nih keylogger nya..
    btw mayoritas masih pake keyboard kabel..tapi boleh juga nih dicoba..
    yang pernah tak coba kalo pengen cari password apapun…
    pake tool Cain and Abel aja,..segala LAN,wiFi semua kena..

    [Reply]

  2. Hi. Initial I wish to say that I actually like your web site, just observed it the past week but I have been following it constantly since then.

    I seem to consent with most of the thoughts and opinions and this post is no exception. absolutely agree with you.

    Thank you to get a excellent webpage and I hope you preserve up the good perform. If you do I will carry on to browse it.

    Have a wonderful day.

    [Reply]

Leave a Reply

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

NoFollow Plugin made by Web Hosting

Check Google Page Rank