Releases: RoganDawes/LOGITacker
LOGITacker v0.2.3-beta
LOGITacker v0.2.3-beta
- added R400 presentation clicker support for covert channel
- integrated customized version of SharpLocker
SharpLocker by Matt Pickford is a fake Windows 10 LockScreen,
which tries to steal logon user credentials.
LOGITacker incorporates a heavily modified and size reduced PowerShell version of SharpLocker (not much left
of the original code according to github 488 additions and 354 deletions
).
What has been kept are the limitations:
- Windows 10 only
- targets 1080p resolution for main screen
- This version was only tested on two Win 10 boxes - so it is experimental
Improvements over legacy Version
- 80 KB exe (PE-File) was converted to self-contained 15KB PowerShell payload, which could run entirely in memory
- does not quit the UI thread of the embedding process
- tries to display the user's real LockScreen background
- tries to display the user's real profile picture
- the exposed NET method (a NET class library is embedded), returns the user password input as
string
object,
which allows further processing in PowerShell if the payload is modified accordingly
LOGITacker SharpLocker integration / HowTo
SharpLocker could be invoked from a already deployed covert channel (requires knowledge of the address of an
injectable receiver - either because it accepts plain keystrokes or because the encryption key is known/was sniffed).
From inside the covert channel shell, SharpLock could be invoked by entering !sharplock
!
Assuming the injectable receiver address is E2:C7:94:F2:3C
a session looks like this:
LOGITacker (discover) $ covert_channel deploy E2:C7:94:F2:3C
... snip ...
LOGITacker (injection) $ covert_channel connnect E2:C7:94:F2:3C
Starting covert channel for device E2:C7:94:F2:3C
enter '!exit' to return to normal CLI mode
...snip...
s [Version 10.0.18363.535]
(c) 2019 Microsoft Corporation. Alle Rechte vorbehalten.
C:\Users\X770>!sharplock
... snip (typed out powershell code) ...
SharpLocker input: notMyRealPassword
C:\Users\X770>
For updates from older LOGITacker versions the command erase_flash
has to be ran once, to re-initialize
the flash data storage for the changed data structures. Not doing so likely causes errors during LOGITacker
operation
v0.2.2-beta
For updates from older LOGITacker versions the command erase_flash
has to be ran once, to re-initialize
the flash data storage for the changed data structures. Not doing so likely causes errors during LOGITacker
operation
- fix: malformed keyboard reports when USB injection is used (caused by inclusion of Logitech checksum)
- added Danish keyboard layout
da
- added python companion script (uses USB HID programming interface to create a injection script with Danish Unicode characters):
python_tests/create_utf8_script_DA.py
v0.2.1-beta
For updates from older LOGITacker versions the command erase_flash
has to be ran once, to re-initialize
the flash data storage for the changed data structures. Not doing so likely causes errors during LOGITacker
operation
- fix: critical issue with incomplete script storage on flash, due to unintended behavior of
fds_record_find
see https://devzone.nordicsemi.com/f/nordic-q-a/52297/fds-read-order-fds_record_find-doesn-t-reflect-write-order-fds_record_write-for-multiple-records-with-same-record_key-and-file_id-if-virtual-page-boundaries-are-crossed - started working on command interface via raw HID (work in progress)
- COMMAND_SCRIPT_STRING = 0x10
- COMMAND_SCRIPT_ALTSTRING = 0x11
- COMMAND_SCRIPT_PRESS = 0x12
- COMMAND_SCRIPT_DELAY = 0x13
- COMMAND_SCRIPT_CLEAR = 0x14
- example (not generic ... directly writing to
/dev/rawhid0
) incompanion2.py
- some changes to logging for Flash Data Storage operations
- increased log buffers size, to account for dropped messages
- known issue: If storing a script to flash fails in the middle, because there's no remaining space, partially
written data of the script isn't removed from flash.
v0.2.0-beta
- covert channel demo implementation (Windows only; tested on Windows 7 - 32bit, Windows 10 - 64bit)
covert_channel deploy <device address>
for client agent deploymentcovert_channel run <device address>
to access the remote shell of a target with deployed cover channel agent- added covert channel support for G900 receiver (deployment is 8 times faster than Unifying, encrypted)
- added covert channel support for G700 receiver (deployment is 8 times faster than Unifying, unencrypted)
- experimental G700/G700s receiver support (
options global workmode g700
), Note: The mode is basically Unifying
compatible but required for thepair device run
command (different pairing parameters). Additionally, keystroke
injection for G700 receivers is ALWAYS UNENCRYPTED. For covert channel usage with G700, this mode has to be enabled, too. - removed unpublished speed up for 4-times faster injection on Unifying (doesn't work reliable on all targets)
- reduced debug output during injection
- USB injection works immediately on operating systems which send an USB keyboard LED report to newly attached
devices (Windows/Linux). In this mode, no initial delay is required for USB injection scripts. The behavior could be
enabled withoptions global usbtrigger ledupdate
- fix: no delay between HID reports in USB injection mode (about 9-times faster typing)
- fix:
pair sniff run
uses channel map according to working mode (Unifying / Lightspeed / G700) - known bug: If USB injection is used with "LED update trigger", attaching an additional device to the USB host could
trigger the injection payload, again, if LOGITacker is still connected (USB SOF event).
v0.1.5-beta
- experimental USB injection support with
inject target USB
- introduction of
options global bootmode
to toggle between USB injection and default behavior - script used for USB injection on boot is set with
options inject default-script <scriptname>
, the respective script has to be stored with the proper name usingscript store <scriptname>
- fix: script storage, script name buffer not trimmed down to new length if new script name of successive storage attempts gets shorter
- fix: issue #8 (typos for passive enum)
- Important note: As the update changes the structure for persistent options
erase_flash
has to be executed once after update
v0.1.4-beta
-
LOGITacker could now pair a device to G-Series LIGHTSPEED receivers (injection with 1000 reports per second)
- Lightspeed mode has to be enabled with
options global workmode lightspeed
- receiver has to be put in pairing mode (and old devices unpaired) with munifying
- The command
pair device run
could be used to pair LOGITacker to the dongle
- Lightspeed mode has to be enabled with
-
The
erase_flash
command erases flash pages occupied by stored data, in case they got corrupted (no script or device storage is possible)
v0.1.3-beta
v0.1.3-beta
pair device run
command now pairs an encrypted keyboard (and stores it to LOGITacker's flash if successfull)
for Unifying receivers in pairing mode.
This could be used for injection, without existence of a real device.
LOGITacker v0.1.2-beta
LOGITacker v0.1.2-beta
- experimental Logitech LIGHTSPEED support (G-Series, tested with G603)
- adjusted device listing with
devices
command (prints more data, especially for devices obtained from sniffed pairing) - fix: for discovered devices which have already been stored to flash, dongle data is re-loaded along with device data
(dongle WPID, classification) - fix: plain keys are printed in passive-enum mode (if AES key known), even if they aren't at first position in the report
- fix: ignore checksum off by one bit in discovery (even if no payload error)
Update instructions
- follow install instructions from readme
- after flashing the new image, run
erase_flash
once and re-plug the LOGITacker dongle (all stored data will be erased
and new default options deployed)
LIGHTSPEED mode
Lightspeed mode could be enabled with options global workmode lightspeed
and disabled with
options global workmode unifying
. To persist the changes run options store
.
Lightspeed mode is not compatible to legacy Unifying mode (different channels, different encryption scheme
for injection). In case you changed the mode, be sure to restart the current task (f.e. discover run
to
restart device discovery in the new mode).
In order to obtain a link encryption key for a LIGHTSPEED device, use the munifying
tool as described in the
README (the latest version added support for G-Series LIGHTSPEED devices)
LOGITacker v0.1.1-beta
First public release
- Firmware for Nordic nRF52840 dongle: logitacker_pca10059.hex
- Firmware for Makerdiary MDK Dongle: logitacker_mdk_dongle.hex
- Firmware for Makerdiary MDK board: logitacker_mdk.hex
- Firmware for AprilBrother 52840 dongle (hardware has LED issues): logitacker_aprdongle.uf2