Results 1 to 3 of 3

Thread: Keyboard sniffing via Electromagnetic signals

  1. #1
    Member
    Join Date
    Feb 2010
    Posts
    204

    Default Keyboard sniffing via Electromagnetic signals

    I found an interesting read from the bbc website
    http://news.bbc.co.uk/1/hi/technology/7681534.stm

    Keyboard sniffers to steal data

    Computer criminals could soon be eavesdropping on what you type by analysing the electromagnetic signals produced by every key press.

    By analysing the signals produced by keystrokes, Swiss researchers have reproduced what a target typed.

    The security researchers have developed four attacks that work on a wide variety of computer keyboards.

    The results led the researchers to declare keyboards were "not safe to transmit sensitive information".

    Better attacks

    The attacks were dreamed up by doctoral students Martin Vuagnoux and Sylvain Pasini from the Security and Cryptography Laboratory at the Swiss Ecole Polytechnique Federale de Lausanne (EPFL).

    The EPFL students tested 11 different keyboard models that connected to a computer via either a USB or a PS/2 socket. The attacks they developed also worked with keyboards embedded in laptops.

    Every keyboard tested was vulnerable to at least one of the four attacks the researchers used. One attack was shown to work over a distance of 20 metres.

    In their work the researchers used a radio antenna to "fully or partially recover keystrokes" by spotting the electromagnetic radiation emitted when keys were pressed.

    In a web posting they added: "no doubt that our attacks can be significantly improved, since we used relatively unexpensive equipments [sic]."

    In videos showing their early work the researchers are seen connecting keyboards to a laptop running on battery power. They avoided using a desktop computer or an LCD display to minimise the chance of picking up signals from other sources.

    Details of the attacks are scant but the work is expected to be reported in a peer-reviewed journal soon.

    The research builds on earlier work done by University of Cambridge computer scientist Markus Kuhn who looked at ways to use electromagnetic emanations to eavesdrop and steal useful information.


    anyone interested in duplicating this? or wait until it's published

  2. #2
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    You've already duplicated it once. Excessive duping leads to hairy palms.

    http://forums.remote-exploit.org/showthread.php?t=17760
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  3. #3
    Member
    Join Date
    Feb 2010
    Posts
    204

    Default

    lol

    pls delete

    must do a search next time

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •