-
Notifications
You must be signed in to change notification settings - Fork 146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Testing Dell KM636 Wireless Mouse and Keyboard #38
Comments
To make it work first you must detect the "key up" packet right? I will make some tests and put the results. |
Tried without success. Can you please provide more info of what you tested? |
The Dell KM636 combo is just OEM Logitech unifying keyboard/mouse combo. It should detect as a Logitech. I tested with the mouse before, seemed to work so I added it to the list. I can't recall if I tested with the keyboard. The attack is a lot more difficult with keyboards in general though. There are a lot of channels to scan through and keyboards are much less chatty. Keep in mind that none of this is intended functionality and both OS and hardware vendors have released patches to prevent some forms of this attack, so your mileage may vary. Also, it definitely won't work on Linux--their Logitech unifying stack wasn't vulnerable to begin with. |
So I should test only with mouse. With your test you were able to inject keystrokes? or just replay attacks? |
Hello,
I've been testing the vulnerability on the keyboard but I'd like to know wich vendor you used to test this.
Is there something you forgot to upload?
Thank you!
The text was updated successfully, but these errors were encountered: