Hit the KeyJack: stealing data from your daily wireless devices incognito - CentraleSupélec Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

Hit the KeyJack: stealing data from your daily wireless devices incognito

Résumé

Internet of Things (IoT) is one of the most fast-growing field in high technologies nowadays. Therefore, lots of electronic devices include wireless connections with several communication protocols (WiFi, ZigBee, Sigfox, LoRa and so on). Nevertheless, designers of such components do not take care of security features most of the time while focusing on communication reliability (speed, throughput and low power consumption). As a consequence, several wireless IoT devices transmit data in plaintext creating lots of security breaches for both eavesdropping and data injection attacks. This work introduces KeyJack, a preliminary proof-of-concept of a solution aiming to eavesdrop wireless devices and hopefully perform injection attacks afterwards. KeyJack operates on widely-used devices: our keyboards! This solution is based on low-cost embedded electronics and gives an attacker or a white hat hacker the possibility to retrieve data from John Doe's computer. This work also shows that this approach could be used to any wireless device using 2.4GHz radio chips like the NRF24L01 from Nordic Semiconductor.
Fichier principal
Vignette du fichier
cesar16_fournier-et-al.pdf (2.36 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01383008 , version 1 (17-10-2016)

Licence

Paternité - Pas d'utilisation commerciale - Pas de modification

Identifiants

  • HAL Id : hal-01383008 , version 1

Citer

Guillaume Fournier, Pierre Matoussowsky, Pascal Cotret. Hit the KeyJack: stealing data from your daily wireless devices incognito. Journées C&ESAR, Nov 2016, Rennes, France. ⟨hal-01383008⟩
496 Consultations
522 Téléchargements

Partager

Gmail Facebook X LinkedIn More