Spelling suggestions: "subject:"crazyradio"" "subject:"crazyradios""
1 |
Penetration testing wireless keyboards : Are your devices vulnerable? / Penetrationstest av trådlösa tangentbord : Är dina enheter sårbara?Tomsic, Niklas January 2022 (has links)
With an ever-increasing amount of cyberespionage and cybercrime, any potential attack vector into a computer system is worthy of investigation. One such vector could be through the wireless keyboard the user themselves use and trust. If an attacker was able to intercept the traffic between the keyboard and the computer they could spy on every keystroke that is being sent to the computer. Additionally, they could potentially inject keystrokes as if they were sitting at the computer themselves. This thesis evaluated 10 different keyboards that were purchased in common consumer electronic stores and 8 of them were found to have new substantial flaws that made it possible to reliably listen to every keystroke sent by the keyboards, as well as allow an attacker to send keystrokes to the connected computer, indirectly giving the attacker full control of the computer. It was concluded that wireless keyboards should not be used in situations where sensitive information is handled regardless of what the keyboard manufacturer claims, as it creates a potential attack vector that is otherwise nonexistent. / Med en ständigt ökande mängd cyberspionage och cyberbrottslighet så är alla potentiella vägar in i ett datorsystem värda att undersöka. Ett sätt att ta sig in i ett system skulle kunna vara genom det trådlösa tangentbord som användaren själv använder och litar på. Om en angripare hade möjligheten att fånga upp trafiken mellan tangentbordet och datorn skulle den kunna lyssna på varenda knapptryck som skickades till datorn. Utöver det så skulle en angripare möjligen kunna skicka egna knapptryck till datorn som om den själv satt vid den. Den här uppsatsen har studerat och utvärderat 10 olika tangentbord som köptes i vanliga elektronikaffärer och i 8 av dem hittades nya allvarliga brister som gjorde det möjligt att både avlyssna vad som skrevs samt att kunna skicka knapptryck till datorn som tangentbordet var kopplat till. Detta ledde indirekt till full kontroll över datorn. Slutsatsen som kunde dras var att trådlösa tangentbord inte bör användas i någon situation där känsligt innehåll hanteras, oavsett vad tillverkaren av tangentbordet hävdar. Detta då det öppnar upp en ny attackyta som inte finns om trådlösa tangentbord inte används.
|
2 |
Drone Movement Control using Gesture Recognition from Wearable DevicesDadi, Venkata Sireesha 23 October 2018 (has links)
Gesture Recognition is a new and upcoming trend that is being widely used in wearable devices and mobile handheld devices. The sensors like Accelerometer, Gyroscope, Heart rate monitor, Barometer and Ambient Light are mostly being included within the device to detect the static or continuous motion, rotational velocity, heartbeat rate of the user, pressure and light conditions for the device respectively. Implementing algorithms to capture the readings of these sensors and implementing them in a necessary way allows a user to use the wearable devices for a wide variety of applications. One such application is controlling Drone that takes user input to determine their motion. A Drone can accept signals from a combination of computer and a radio dongle and would fly according to the accepted commands. The wearable device can detect the motion of the wearer's hand when moved left, right, up, down etc using the Gyroscope sensor. This information can be used to process and send the signals to the Drone to enable wireless and gesture-based movement control.
|
Page generated in 0.0221 seconds