📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 13, ISSUE 12, DECEMBER 2024

Exploiting Vulnerabilities using Keystroke Injections

Mr. Dhanraj, Varun Hegde, Smayan C N

DOI: 10.17148/IJARCCE.2024.131231
Abstract: In this paper, we discuss the development and implementation of a malicious and non-malicious payload delivery system using the Digispark microcontroller. Our system leverages extremely fast, automated keystroke injections to deliver a variety of payloads. We demonstrate how these injections enable the execution of a reverse PowerShell shell, establishing a remote connection for command execution. Additionally, we present a payload that stealthily retrieves Wi-Fi credentials, creates a backdoor for persistent access, and escalates privileges to gain full control of the target system. Our approach optimizes keystroke injection for speed, bypassing traditional security measures by simulating human input, thereby minimizing detection. We also explore ethical applications, such as penetration testing, and highlight the dual-use nature of the Digispark-based delivery system. Through this work, we contribute novel methods of leveraging the Digispark microcontroller for both malicious and ethical purposes, advancing the understanding of microcontroller-based payload delivery in cybersecurity. Index Terms: Digispark, keystroke injection, reverse PowerShell shell, Wi-Fi password theft, backdoor, privilege escalation, payload delivery, cybersecurity.

How to Cite:

[1] Mr. Dhanraj, Varun Hegde, Smayan C N, “Exploiting Vulnerabilities using Keystroke Injections,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2024.131231