Your Ad Here Your Ad Here
Results 1 to 5 of 5

Thread: 'Power-Line Exploit' Logs Your Keystrokes Using Outlets, Lasers

  1. #1
    Darth Sushi's Avatar Sushi Lord
    Join Date
    Sep 2002
    'Power-Line Exploit' Logs Your Keystrokes Using Outlets, Lasers
    By Jack Loftus, 6:30 PM on Sun Jul 12 2009

    " Thinking about plugging your laptop into one of those coveted airplane terminal power outlets while you wait for your flight to arrive? Be careful, because a hacker could be using those energy-giving wires against you.

    The technique is a form of keylogging, which is nothing new, but in an interesting twist hackers have figured out a non-traditional way to replicate the process using nothing but the electric signals created with each keystroke. Oh, and even if you aren't plugged into a socket, they they can still log keystrokes remotely using a laser.

    Called the "power-line exploit," the two-part technique is outlined in a Network World article ominously headlined "How to use electrical outlets and cheap lasers to steal data," and will be but one of several nefarious data-stealing methods on display at Black Hat USA 2009 in Las Vegas later this month.

    Network World explains:

    In the power-line exploit, the attacker grabs the keyboard signals that are generated by hitting keys. Because the data wire within the keyboard cable is unshielded, the signals leak into the ground wire in the cable, and from there into the ground wire of the electrical system feeding the computer. Bit streams generated by the keyboards that indicate what keys have been struck create voltage fluctuations in the grounds.

    [If the laptop is unplugged], attackers point a cheap laser, slightly better than what is used in laser pointers, at a shiny part of a laptop or even an object on the table with the laptop. A receiver is aligned to capture the reflected light beam and the modulations that are caused by the vibrations resulting from striking the keys.


  2. News (Archive)   -   #2
    That's quite clever,

  3. News (Archive)   -   #3
    ulun64's Avatar Poster
    Join Date
    May 2007
    Kuala Lumpur, Malaysia, M
    Either it's an amazing fact or it's a hoax.....

  4. News (Archive)   -   #4
    megabyteme's Avatar PROF MALINGERER BT Rep: +18BT Rep +18BT Rep +18BT Rep +18
    Join Date
    Apr 2009
    Using Mrs. Nussbaum's CC#
    That's really cool!

    Reminds me of this project which has been around and used for several years.

    It uses a laser pointer, a photocell, a microphone cable and a recorder. The laser is bounced off of a window and aimed at the photocell. The photocell changes as the laser light changes. The resulting feed is recorded, then played back.

    That said, I believe the article is accurate and true.
    Quote Originally Posted by IdolEyes787 View Post
    The internet is a trap therefore it's inherently evil. Posts should be appropriately vile in keeping with that.

  5. News (Archive)   -   #5
    how minutely can the attacker observe the fluctuations in voltage of fsystem to gain knowledge of the keystrokes ?


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts