Hacking USB webkeys with Bus Pirate

Posted on Thursday, October 4th, 2012 in Bus Pirate, hacks, reversed, USB by the machinegeek

Brad Antoniewicz has been exploring USB webkeys, the dongle devices used as marketing tools which guide Windows users to a seller’s webpage when plugged into the USB port. Essentially, webkeys function as a USB HID, emulate a keyboard and send commands stored in EEPROM to the host PC. Brad explored his webkey’s EEPROM using the Bus Pirate to discover the pinout and reprogram the memory.

For details on this process, read Brad’s post at Open Security Research.

Want to try your hand at hardware hacking? You can make it easier with a Bus Pirate for about $30.

Kevin via the contact form.

This entry was posted on Thursday, October 4th, 2012 at 2:00 pm and is filed under Bus Pirate, hacks, reversed, USB. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Nathan Johnson: 100 channels. Not many are legal in any given area. Be sure to comply with local laws.
  • William Brodie-Tyrrell: It's getting to the point where it's cheaper and definitely easier to use a Pi Zero or similar and a $20 3G USB dongle. Power...
  • KH: IIRC most of the actual operating system of modern HDDs is in one of the platter(s); the stuff on the 25VF010 is a bootup firmware......
  • Trev: I don't know of any inexpensive 3G modules (prices start around $US 50), but it does explain why 2G modules are relatively inexpensive by comparison....
  • Zonie: This site Rocks!