Learn how LOGITaker works and setup your own to attack near keyboards.

Hardware nRF52840 radio dongle

  • Nordic nRF52840 Dongle (pca10059)
  • MakerDiary MDK Dongle
  • MakerDiary MDK
  • April Brother Dongle

Logitech Vulnerabilities

  • MouseJack (plain injection)
  • forced pairing
  • CVE-2019-13052 (AES key sniffing from pairing)
  • CVE-2019-13054 (injection with keys dumped via USB from presentation clickers)
  • CVE-2019-13055 (injection with keys dumped via USB from Unifying devices)

LOGITacker Virtual USB devices

  • USB CDC ACM
  • USB mouse
  • USB keyboard
  • USB HID raw

LOGITacker
Verify devices to use
 Logitacker discover
Logitacker discover
 Options
Options

LOGITacker Options

 Options
Options
Boot Mode
 Boot Mode
Boot Mode
 Boot Mode discover
Boot Mode discover
Working Mode
 Working Mode
Working Mode
USB Injection
 Working Mode USB Injection
Working Mode USB Injection

https://github.com/RoganDawes/LOGITacker

WHID Elite: Open-Source Multi-Purpose Offensive Device

LOGITacker

Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every month.

Read our privacy policy for more info.

Categorized in:

Hacking Devices,

Last Update: 30/03/2024

Tagged in: