Keylogger 101 and Keylogger Grabber Wi-Fi Premium First Look
Keylogger 101 and Keylogger Grabber Wi-Fi Premium First Look
For those that follow my blog, you will find that I tend to post a few articles after DEF CON on the cool tools I end up purchasing every year from various vendors. One fun little gadget that I’m going to cover is the Wi-Fi enabled Keylogger called KeyGrbberer Wi-Fi Premium. You can learn more about this tool HERE as well.To summarize a Keylogger, it is a tool designed to capture keystrokes. This may be for auditing purposes, recording for scripting reasons or something more malicious like spying on somebody. There are many variations of keyloggers on the market and some are useful for specific situations. For example, there are keyloggers that you can implant into most common model keyboards meaning they are connected to the actual internal chipboard and only can be detected by opening the keyboard. Another option is using keylogger software that is installed on a host system. The more common approach is placing a small device at the end of the keyboard connection so it can perform a man-in-the-middle connection between what keys are entered into the keyboard and transferred into the computer.
The Keylogger Grabber Wi-Fi Premium is a USB option designed to connect to USB keyboard. There is a lower grade model that has less space and doesn’t include Wi-Fi with a cost of around $50 dollars. The Premium version offers 4 gigs of storage and Wi-Fi that is setup through updating a text file either edited directly or using the GUI software. The image at the top of this article is the model I picked up for $150 dollars.
Option 1: Connect it to a keyboard and press the default keys to turn it into a USB hard drive, which are K, B and S simultaneously by default. Once it becomes a hard drive, I can create a new file called WIFI.txt with the wireless network information it should look to connect to (SSID, encryption, Password) and what email it should send reports to. Here is an example configuration.
WiFiNetwork=MyNetwork
WiFiPassword=MyPassword
WiFiEncryption=WPA2
Recipient=john@smith.com
Once the USB is unplugged and plugged back in to reboot, it will take
a minute or so before it auto connects to the wifi network specified
in wifi.txt. I found once it successfully connects to the wifi network,
it will send a report to the specified email. Here is an example of what
the email looks like. I didn’t capture many key strokes in this so
think about future reports showing every keystroke entered.


Ideal Attack Goal: I set up my Keylogger to connect to a Wi-Fi SSID I broadcast from my cell phone. The goal is to plant the Keylogger at a target location and later access it from outside the building while sitting in my car. This way I can drive up at night and pull down what was logged without having to re-enter the building. I could later send new configuration to wipe it to hide my tracks. I tested it and it worked at my house (Keylogger does connect to my phone and I can access it from my laptop from another room). I can’t wait to use it in the near future.
Post a Comment