Tuesday, June 09, 2009

Keykeriki faux-pas

What a shame, we released the software package yesterday and removed the schematics at the same time. Sorry for that, both tar.gz's are now back on the website. Btw we have about 80 TRF7900 receiver chips in stock if someone want to build a Keykeriki, just contact us using email.

greetz

max

Thursday, June 04, 2009

Keykeriki vs. Logitech Round 1

Here is a picture of the information gathered using my Keykeriki and an oscilloscope. This image shows the sequence patterns needed to implement the parser for Logitech keyboards. Important side-note: Logitech uses standard miller symbols not the Microsoft variants.



If you dont know what Keykeriki is.. its an open-source, universal wireless keyboard sniffing project. Checkout

Labels: , , , ,

Monday, June 01, 2009

27Mhz Wireless Keyboard Sniffer Released

1.5 years after releasing our whitepaper "27Mhz Wireless Keyboard Analysis Report" about wireless keyboard insecurities, we are proud to present the universal wireless keyboard sniffer: Keykeriki. This opensource hardware and software project enables every person to verify the security level of their own keyboard transmissions, and/or demonstrate the sniffing attacks (for educational purpose only). The hardware itself is designed to be small and versatile, it can be extended to currently undetected/unknown keyboard traffic, and/or hardware extensions, for example, a repeating module or amplifier. Checkout http://www.remote-exploit.org/Keykeriki.html for further information, schematics and more. We will provide pcb's as soon they are ready.

greetings

max