Pwn all the Peripherals: MouseJack, KeyJack, and KeySniffer

Presented at ToorCon San Diego 18 (2016), Oct. 15, 2016, 4:30 p.m. (50 minutes).

What if your wireless mouse or keyboard was an effective attack vector? Research reveals this to be the case for devices from 16 major vendors, including Microsoft, Dell, Lenovo, HP, Toshiba and Logitech. Most the vulnerable devices can’t be patched due to hardware limitations, and will remain vulnerable as long as they are in use. Learn about the research processes used to identify these vulnerabilities, potential attack scenarios, and lots of live demos.


Presenters:

  • Marc Newlin
    Marc is a security researcher and software engineer at Bastille Networks, where he focuses on RF/IoT threats present in enterprise environments. He has been hacking on software defined radios since 2013, when he competed as a finalist in the DARPA Spectrum Challenge. He had the distinction of being the only solo finalist team, and was the only finalist who hadn’t gone to college. In 2011, he wrote software to reassemble shredded documents for the DARPA Shredder Challenge, finishing the competition in third place out of 9000 teams.

Similar Presentations: