Visible to the public Implementation and Analysis of Keyboard Injection Attack using USB Devices in Windows Operating System

TitleImplementation and Analysis of Keyboard Injection Attack using USB Devices in Windows Operating System
Publication TypeConference Paper
Year of Publication2020
AuthorsRamadhanty, A. D., Budiono, A., Almaarif, A.
Conference Name2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)
Date PublishedSept. 2020
PublisherIEEE
ISBN Number978-1-7281-8247-6
KeywordsArduino, Arduino Pro Microdevice, composability, Firewalls (computing), Hardware, Internet, keyboard injection attack analysis, keyboard injection attack implementation, Keyboards, keylogger, keylogger program, keystroke analysis, Metrics, microcomputers, Microsoft Windows (operating systems), Operating systems, peripheral interfaces, powershell, powershell script, pubcrawl, resilience, Resiliency, security, security of data, Software, Turning, Universal Serial Bus, universal serial bus devices, USB, USB devices, user interfaces, Windows, Windows 10 operating system attacks, Windows operating system, Windows Operating System Security
Abstract

Windows is one of the popular operating systems in use today, while Universal Serial Bus (USB) is one of the mechanisms used by many people with practical plug and play functions. USB has long been used as a vector of attacks on computers. One method of attack is Keylogger. The Keylogger can take advantage of existing vulnerabilities in the Windows 10 operating system attacks carried out in the form of recording computer keystroke activity without the victim knowing. In this research, an attack will be carried out by running a Powershell Script using BadUSB to be able to activate the Keylogger program. The script is embedded in the Arduino Pro Micro device. The results obtained in the Keyboard Injection Attack research using Arduino Pro Micro were successfully carried out with an average time needed to run the keylogger is 7.474 seconds with a computer connected to the internet. The results of the keylogger will be sent to the attacker via email.

URLhttps://ieeexplore.ieee.org/document/9274631
DOI10.1109/IC2IE50715.2020.9274631
Citation Keyramadhanty_implementation_2020