Home page logo

bugtraq logo Bugtraq mailing list archives

logitech wireless devices: man-in-the-middle attack
From: Axel Hammer <alpha01 () grafx-design de>
Date: Wed, 16 May 2001 21:40:21 +0200

Device(s) tested:
Logitech wireless desktop (mouse, keyboard, receiver)
These devices transfer data wireless via RF, this set uses
CB-band-frequencies at about 27MHz.
The syncronisation between the wireless devices is initiated by pressing
a connect-button on the receiver and then on the wireless devices to
find a matching and undistorted pair of frequencies (oder codes).

The receiver waits for 30 minutes after initialising a connect for new
devices to sync on them.
An attacker is able to sniff the connect-sequence of a victim's device
far and to lock-in to the pair of frequencies / codes of the
victim's devices or to take control of a victim's devices.

It is possible to gain access to wireless devices. The keystrokes may be
sniffed in plain, unscrambled text.
It is possible for the victim AND the attacker to read the keystrokes
the victim to notice the attack.

To sniff a connection of wireless devices, you need a receiver from the
same manufacturer, same model.
By slight modifications it is possible, to extend the range of the
receiver to
about 30m (using an external antenna).
It is neccessary to 'remotely' initiate a reconnection of the victim's
devices by the victim himself (no details, sorry).

We intend strongly NOT TO USE these devices in security-relevant

not informed.

Regards, Axel

Information first published: (c) 2001/05/05, www.daten-treuhand.de

  By Date           By Thread  

Current thread:
  • logitech wireless devices: man-in-the-middle attack Axel Hammer (May 17)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]