Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

All Your Keyboards Are Belong to Us - Keyboard Attack Vectors and Security Vulnerabilities

DEFCONConference via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore comprehensive keyboard hacking techniques in this 38-minute DEF CON 33 conference talk that demonstrates live attacks against various keyboard types. Learn how attacking keyboards provides the ultimate strategy for hijacking sessions before encryption occurs, capturing plaintext data at its source through methods often simpler than network protocol attacks. Begin with traditional keylogger implementations before advancing to sophisticated "Van Eck Phreaking" attacks that exploit electromagnetic emanations from individual keystrokes and RF wireless connections. Master cutting-edge acoustic attack techniques that eavesdrop on typing sounds to reconstruct keystrokes. Discover signal leak attack vectors specifically targeting keyboard input devices using only open-source methods and unclassified materials. Apply this knowledge responsibly for defensive cybersecurity purposes while understanding the full spectrum of keyboard-based attack methodologies.

Syllabus

DEF CON 33 - All your keyboards are belong to us! - Federico Lucifredi

Taught by

DEFCONConference

Reviews

Start your review of All Your Keyboards Are Belong to Us - Keyboard Attack Vectors and Security Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.