An extensible platform for wireless peripheral keystroke sniffing for microcomputers.
The purpose of this project is to provide for simple, extensible, human-readable interfacing with wireless peripheral sniffing. By combing a suite of existing tools into a simple set of commands, this platform makes penetration testing and device reconnaissance compact. This set of tools is configured to run on a Raspberry Pi or other microcomputer
mithören was developed as the senior design project of Michael Wolf and Colin Buckles for the University of Cincinnati's School of Information Technology. It was presented on April 11th, 2017 at the 2017 UC IT Expo. The slide deck can be viewed at https://wolfmd.me/docs/mithren.pdf.
Demo: https://www.youtube.com/watch?v=CFwfd1jvFlc
This project is licensed under GPL v3.
mithören seeks to bring together a variety of tools from around the Internet which can be used for testing the security of wireless peripherals for vulnerabilities.
While this initiative is generally an educational PoC, it will be continually developed, building support for a variety of hardware hacking models and eventually GNU Radio interfaces.
Disclaimer: This tool in its present state is for educational and research purposes only. Please contact the owner before use outside of this context
mithören currently supports:
- Mousejack
- KeySweeper
- KeyKeriki
- GNU Radio
mithören currently exports reports as emails in the following formats: - Plaintext - JSON
The application can be run immediately given the proper hardware. Modules generally require an antenna that can transmit and receive on the desired frequency bands. For requirements of each module, see the notes below:
- Mousejack
- https://github.com/BastilleResearch/mousejack
- Both the teensy and the Crazy Radio PA work, however the range on the teensy is quite limited
- Flash image file under 'image' onto an SD-card. This image is best utilized by a microcomputer
Configure a simple mongodb database and edit the conninfo.py and databaseconnection.py files to match the parameters of database name, database host, username and password.
Set up postfix on localhost to either route through your big box email or send messages itself
cd app/
sudo python mithren-frontend.py
- Start the mithrend.py script in your terminal or set it up a service using the mithren.service file in you /etc/systemctl directory
Any questions or comments can be sent to: michael@nullbrook.org
- Implement GPG encryption
- Develop more modules
- Instrument more thorough device identification