Mouse Jacking: A Survey

  • Varun Chitale Department of Computer Science, MITCOE, , Paud Road, Kothrud, Pune 411038, India
  • Anandita Bodas Department of Computer Science, MITCOE, , Paud Road, Kothrud, Pune 411038, India
Keywords: Mouse Jacking, Spoofing Mouse, Spoofing Keyboard, Encryption in wireless devices, XOR.

Abstract

In the modern era of technology, devices have become smaller, more user friendly and most importantly, wireless. Gadgets these days come with convenient wireless variants for the user. These wireless gadgets allow the user to access the host machine from a distance that varies depending upon the range of the radio signal. The latest innovation of wireless mouse has given the user freedom from the old technology of wired mouse. However, there is a serious threat that comes along with the facility of a wireless mouse. The data transmitted from the click on the mouse to the radio transceiver attached to the computer is not in an encrypted format, and is usually considered as data that is not confidential or important. Mouse Jacking is a set of vulnerabilities that is associated with wireless, non-Bluetooth mice and keyboards. Mouse Jacking allows the hacker or unauthorized user to access the target computer from 100 meters away by using an inexpensive USB dongle.

References

Godspeed Travis, “Promiscuity is the nRF24L01+'s Duty.” Internet:

http://travisgoodspeed.blogspot.com/2011/02/promiscuity-is-nrf24l01s-duty.html. Feb 7, 2011 [Mar 04, 2016].

William Stalling, “Cryptography and Network Security: Principles and Practice, International Edition: Principles and Practice” , 6th edition, vol. 1, Ed. New York, Pearson, 2014, 66-231.

Wikipedia: The Free Encyclopedia. Wikimedia Foundation Inc., ”Meta key”, Internet:

https://en.wikipedia.org/wiki/Meta_key, Feb. 6, 2016 [Mar. 05, 2016]

Logitech, “Logitech Advanced 2.4 GHz Technology”, Internet:

http://www.logitech.com/images/pdf/roem/Logitech_Adv_24_Ghz_Whitepaper_BPG2009.pdf, Mar. 2, 2009 [Mar. 3, 2016]

Andy Greenberg. “Flaws in Wireless Mice and Keyboards Let Hackers Type on Your PC.” Internet:

https://www.wired.com/2016/02/flaws-in-wireless-mice-and-keyboards-let-hackers-type-on-your-pc/, Feb. 23, 2016 [Mar. 03, 2016]

Newlin, Marc, “Hacking Wireless Mice with an NES Controller”, ToorCon 17, San Diego, CA, Oct 24, 2015, [Mar 05, 2016].

Published
2016-09-27
How to Cite
Chitale, V., & Bodas, A. (2016). Mouse Jacking: A Survey. International Journal of Computer (IJC), 22(1), 103-108. Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/722
Section
Articles