Saturday, 30 July 2016

KeySniffer use to Hack Cheap Wireless Keyboards

A vulnerability in cheap wireless keyboards lets do the hackers to steal private data,and use it in wrong way.For more visit this site Bastille reported this week.

The vulnerability lets hackers use a new attack that called the firm dubbed "KeySniffer" to  capture every keystroke typed from your cheap keyboard up to 250 feet away.
The data that are stolen from your computer is rendered in clear text. It lets hackers search for victims' credit card information, bank account usernames and passwords, answers to security questions, network access passwords, and any data typed into a document or email.


KeySniffer's Approach

The cheap keyboards are detected easily by the hackers, they use  the USB dongles which are always used to  transmitting synchronization packets ffrom attacker to victems ,and this do  the keyboard find them, whether they are in use or not. That lets a hacker home in on click quickly.
The sync packets contain the unique identifier for the keyboard or dongle for the victems. Once a  keyboard is identified, the hacker uses the identifier to filter wireless transmissions to use  the keystrokes sent by the target keyboard.
Hackers not only can steal your data, but also can inject keystrokes to type remotely on a vulnerable computer, installing malware or stealing data from your Computer
Wireless keyboard sniffers are not new this would be come many minth ago. Researchers at Remote Exploit in 2009 developed KeyKeriki, an open source hardware/software project that let users decode Microsoft wireless keyboards.
and code that keyboard as the user required.
Hacker Samy Kamkar two years ago developed KeySweeper, a proof-of-concept hardware/software keystroke logger disguised as a USB wall charger, which attacked any nearby Microsoft wireless keyboard.Through this keystroke logger hackers can attack the nearby device and hacked into their Computers.

The FBI this spring issued a warning about the  KeySweeper-like devices.
Keyboards vulnerable to the KeyKeriki and KeySweeper attacks exclusively use Nordic Semiconductor nRF 241 transceivers, which employ a well-documented physical layer protocol. They transmit radio packets only when the keyboard is in use.

Encryption Helps
Higher-end keyboards aren't vulnerable because they "frequently use transceivers from Nordic Semiconductor which have built-in support for 128-bit AES encryption,Whether or not the encryption is used is up to each vendor, but in general.
Bluetooth keyboards aren't susceptible because Bluetooth encrypts all data transmitted over the air.If security is a concern, make sure the keyboard you buy uses an encrypted connection.

How to Save Yourself From That Type Of Hackers

Make sure that you are using encrypted connection.Follow the tips used to save from hacking.
Cover your camera with solution Tape,also Cover Your mic.

I hope you get through the following hacker's way's how they hacked into someone computer...Thanks for read this Artical...Keep supporting and Visiting my Blog