-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MK520 —— 请求测试教程 #3
Comments
Google translates this as: 1, my device is MK520, keyboard and mouse set. |
Re 4, that is likely to be either a CrazyRadio PA+LNA, with a NRF24LU1 chip on it, or possibly an AprilBrother NRF52840 dongle. Perhaps you can provide a link to the video in question, so we can be sure? |
Re 3, this article has more information on the difficulty of updating the firmware of the receiver: Not too helpful, I admit. Perhaps Logitech will improve their website, and updaters. You may actually have better luck using the Linux fwupd site. https://fwupd.org/ |
https://www.freebuf.com/news/207981.html 看这个链接中的演示视频。注意视频中带天线的那个设备。 |
I believe that is the CrazyRadio. |
The PoC for CVE-2019-13052 (sniff pairing, live decryption of keyboard) could be replicated using either
In order to sniff a pairing, additional software is needed to pair a device:
PoC for CVE-2019-13053 (encrypted injection without knowledge of encryption key) could be replicated using PoC for CVE-2019-13054 (extraction of encryption keys from presentation clicker receivers) and CVE-2019-13055 (extraction of encryption keys from Unifying receivers) could be replicated using the full version of munifying combined with either Note: CVE-2019-13052 (which will not be patched) will achieve the same results as CVE-2019-13054/13055 (will be patched). All of these vulnerabilities allow an attacker with one-time physical access to steal the link encryption keys of a wireless device. The vulnerability which will be patched (USB based key eextraction), only applies to some Logitech receivers - the vulnerability which will not be patched (key extraction based on sniffing of device pairing) applies to ALL Logitech receivers |
@mame82 Thank! Thank you very much for your guidance and help. |
@RoganDawes Thank! Thank you very much for your guidance and help. |
@mame82 2、What is "LOGITacker"?It's "AprilBrother NRF52840 dongle"?Are there any corresponding pictures or introductory links? 3、I really want to know, what is the wireless receiver used in your video? Are all the four vulnerabilities detected using this device for signal sniffing? |
Do you mean that:
This combination of software and hardware has the most obvious effect on CU0007 equipment. yes or no ?
Of course, you need to brush firmware into a LOGITacker device before using it. “https://github.com/mame82/LOGITacker/releases/tag/v0.1.2-beta” This combination of software and hardware has the most obvious effect on CU0007 equipment. yes or no ? |
Everything correct, but with CU0007 it is a bit different. LOGITacker and/or mjackit could be used to interact with CU0007 (Unifying Nordic), CU0008 (Unifying TI / Lightspeed), CU0012 (Unifying TI nano) ... additionally CU0016 (R500/SPOTLIGHT clickers TI). As CU0007 is a Nordic based dongle with nRF24LU1+ it could server as replacement for the CrazyRadio PA. The modified 'nrf-research-firmware' could be flashed onto this dongle, instead. In contrast to CrazyRadio, the CU0007 has a PCB antenna and misses the PA, so RF range isn't as good. |
1、我的设备是MK520,键盘和鼠标套装。
2、我现在无法确定unifying设备的固件是旧的还是新的,怎么确定?
3、我在罗技的官方网站上,只看到了unifying设备的识别软件,是2010年的版本,并没有看到固件在哪里下载,也没有看到三年前的固件修复补丁在哪里,求指教?
4、演示视频中,带天线的USB类识别装置是什么 ?如何可以得到?
The text was updated successfully, but these errors were encountered: