Mouse Jacking: A Survey
Keywords:Mouse Jacking, Spoofing Mouse, Spoofing Keyboard, Encryption in wireless devices, XOR.
In the modern era of technology, devices have become smaller, more user friendly and most importantly, wireless. Gadgets these days come with convenient wireless variants for the user. These wireless gadgets allow the user to access the host machine from a distance that varies depending upon the range of the radio signal. The latest innovation of wireless mouse has given the user freedom from the old technology of wired mouse. However, there is a serious threat that comes along with the facility of a wireless mouse. The data transmitted from the click on the mouse to the radio transceiver attached to the computer is not in an encrypted format, and is usually considered as data that is not confidential or important. Mouse Jacking is a set of vulnerabilities that is associated with wireless, non-Bluetooth mice and keyboards. Mouse Jacking allows the hacker or unauthorized user to access the target computer from 100 meters away by using an inexpensive USB dongle.
Godspeed Travis, “Promiscuity is the nRF24L01+'s Duty.” Internet:
http://travisgoodspeed.blogspot.com/2011/02/promiscuity-is-nrf24l01s-duty.html. Feb 7, 2011 [Mar 04, 2016].
William Stalling, “Cryptography and Network Security: Principles and Practice, International Edition: Principles and Practice” , 6th edition, vol. 1, Ed. New York, Pearson, 2014, 66-231.
Wikipedia: The Free Encyclopedia. Wikimedia Foundation Inc., ”Meta key”, Internet:
https://en.wikipedia.org/wiki/Meta_key, Feb. 6, 2016 [Mar. 05, 2016]
Logitech, “Logitech Advanced 2.4 GHz Technology”, Internet:
http://www.logitech.com/images/pdf/roem/Logitech_Adv_24_Ghz_Whitepaper_BPG2009.pdf, Mar. 2, 2009 [Mar. 3, 2016]
Andy Greenberg. “Flaws in Wireless Mice and Keyboards Let Hackers Type on Your PC.” Internet:
https://www.wired.com/2016/02/flaws-in-wireless-mice-and-keyboards-let-hackers-type-on-your-pc/, Feb. 23, 2016 [Mar. 03, 2016]
Newlin, Marc, “Hacking Wireless Mice with an NES Controller”, ToorCon 17, San Diego, CA, Oct 24, 2015, [Mar 05, 2016].
How to Cite
Authors who submit papers with this journal agree to the following terms.