Hacking USB webkeys with Bus Pirate


Brad Antoniewicz has been exploring USB webkeys, the dongle devices used as marketing tools which guide Windows users to a seller’s webpage when plugged into the USB port. Essentially, webkeys function as a USB HID, emulate a keyboard and send commands stored in EEPROM to the host PC. Brad explored his webkey’s EEPROM using the Bus Pirate to discover the pinout and reprogram the memory.

For details on this process, read Brad’s post at Open Security Research.

Want to try your hand at hardware hacking? You can make it easier with a Bus Pirate for about $30.

Kevin via the contact form.

This entry was posted in Bus Pirate, hacks, reversed, USB and tagged .

Leave a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Notify me of followup comments via e-mail. You can also subscribe without commenting.