A Study on Development of Attack System on the 2.4 GHz AES Wireless Keyboard 


Vol. 42,  No. 1, pp. 233-240, Jan.  2017


PDF
  Abstract

Due to a recent rise in use of a wireless keyboard and mouse, attacks which take user‘s input information or control user’s computer remotely exploiting the physical vulnerability in the wireless communication have been reported. Especially, MouseJack, announced by Bastille Network, attacks 2.4 GHz wireless keyboards and mice through exploiting vulnerability of each manufacturer’s receiver. Unlike other attacks that have been revealed, this allows to attack AES wireless keyboards. Nonetheless, there is only a brief overview of the attack but no detailed information on this attacking method. Therefore, in this paper we will analyze the Microsoft 2.4 GHz wireless mouse packet and propose a way to set the packet configuration for HID packet injection simulating a wireless mouse. We also develop a system with 2.4 GHz AES wireless keyboard HID packet injection using the proposed packet and demonstrate via experiment that HID packet injection is possible through the system we built.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

J. Lee, B. Sim, A. Park, D. Han, "A Study on Development of Attack System on the 2.4 GHz AES Wireless Keyboard," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 1, pp. 233-240, 2017. DOI: .

[ACM Style]

Ji-Woo Lee, Bo-Yeon Sim, Aesun Park, and Dong-Guk Han. 2017. A Study on Development of Attack System on the 2.4 GHz AES Wireless Keyboard. The Journal of Korean Institute of Communications and Information Sciences, 42, 1, (2017), 233-240. DOI: .

[KICS Style]

Ji-Woo Lee, Bo-Yeon Sim, Aesun Park, Dong-Guk Han, "A Study on Development of Attack System on the 2.4 GHz AES Wireless Keyboard," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 1, pp. 233-240, 1. 2017.