Remix.run Logo
mystraline 2 days ago

There was a person who captured a Logitech Starburst V2 packet capture from one of their management machines.

Using a tool called JackIt, demonstrated either sniffing all text from a keyboard, OR injection of an emulated keyboard through the dongle.

IIRC, the mouse was a clone Logitech that was even plugged in to charge.

hackernudes 2 days ago | parent [-]

Ok this took me a minute to parse.

Someone at DEFCON captured the wireless data from a mouse/keyboard dongle. The dongle was connected to a computer that belonged to the organizers, possibly managing the Wall of Sheep. They were able to capture and/or simulate input from/to the dongle.

Nice.

mystraline 2 days ago | parent [-]

Yep, that's correct. Probably shouldnt post here tired!

I saw it on the defcon subreddit. Post was deleted, but IA made a snapshot.

https://web.archive.org/web/20220428221916/https://www.reddi...