logo elektroda
logo elektroda
X
logo elektroda

TL;DR

  • A Logitech wireless peripheral hack demonstrates remote keyboard and mouse impersonation, plus interception of keystrokes and clicks.
  • The approach is presented as different from MouseJack, because Logitech’s released patch does not block it.
  • A short video shows the attack working in practice.
Generated by the language model.
ADVERTISEMENT
Treść została przetłumaczona polish » english Zobacz oryginalną wersję tematu
📢 Listen (AI):
  • #31 15796241
    Wertyuud
    Level 22  
    Posts: 279
    Help: 65
    Rate: 60
    PT5529B, or similar.
  • ADVERTISEMENT
  • #32 16887047
    piotr_go
    DIY electronics designer
    Posts: 2904
    Help: 94
    Rate: 3336
    =========== A little logitech hacking update. ============
    Some time ago, when I figured out the keyboard pairing, I released the k400. The keyboard cannot be paired. I think to myself, well, my fault.
    Today I was tempted to bury more with her. It turned out that the fault was not mine, but logitech's.
    Pairing data is stored in OTP (one-time programming) memory. The memory was quite small, so during the experiments it ran out quickly. :(
    Planned aging of the product by logitech.
  • ADVERTISEMENT
  • #33 16887365
    Sas_AS
    Level 16  
    Posts: 187
    Help: 3
    Rate: 70
    Nihil novi sub sole. One can try to "revive" the memory for an indefinite period of time with a thermal shock. Logitech also uses a different practice, noticeable in the USB receivers of the H600 and H800 headphones. After exceeding a certain limit, each subsequent pairing takes correspondingly longer. The receiver is not much cheaper than headphones, so the customer will buy another product.
    I have the impression that the short period of memory life is also used by Sony in its portable audio products from the srs series with an integrated battery, where the charging process and of course pairing and sound adjustment are controlled by a microprocessor. At some point, the product pretends to start the charging process, signaling it with the indicator, but the actual charge controller itself is not controlled by the microcontroller. After charging the battery without the use of the processor, the product of course works perfectly fine until the battery is discharged :-) The same applies to pairing via NFC, where after some time of use the device sends "wrong tag" but the manual connection via bluetooth still works :-) Another thing is the lack of control of the class d amplifier, as if everything is working and the microcontroller is suddenly offended and does not send anything to the amplifier driver :-) These, of course, are only unprovable theories, such as the long-standing case of Philips monitors.
  • ADVERTISEMENT
  • #34 16887613
    piotr_go
    DIY electronics designer
    Posts: 2904
    Help: 94
    Rate: 3336
    Sas_AS wrote:
    One can try to "revive" the memory for an indefinite period of time with a thermal shock.

    It won't work, the memory is full, you would have to delete it, and that's only UV after exposing the structure.

    Sas_AS wrote:
    like the old case of philips monitors.

    Some time ago I was reminded of it and I was looking for info in google but as you can see for money you can whiten.
  • #35 17849581
    el_wojtaso
    Level 2  
    Posts: 3
    Hello everyone,

    I noticed that you guys were talking about Logitech keyboards and receivers in this thread. I have a Logitech k220 keyboard, the USB receiver does not exist anymore, but I want something else. Namely, I would like to turn it into a bluetooth keyboard. The K220 transmitter is based on the system
    NRF 31504E, pictures of this circuit are on the 1st page of this thread. I would like to add that I have a bluetooth module based on bc417 - i.e. such an Arduin standard. Do any of you have an idea how to do it? Well, does anyone know how to get the output pinout of the NRF 31504E chip?

    greetings
    Wojtek
  • #36 17849769
    piotr_go
    DIY electronics designer
    Posts: 2904
    Help: 94
    Rate: 3336
    el_wojtaso wrote:
    Well, does anyone know how to get the output pinout of the NRF 31504E chip?

    I suspect that it is the same as nrf24LE1, but the OTP version programmed specifically for Logitech.
    You will not reprogram it, even if you change it to flash version, the radio has nothing to do with BT except transmission band.
  • ADVERTISEMENT
  • #37 17849827
    el_wojtaso
    Level 2  
    Posts: 3
    So there is nothing to dream about "catching" RX / TX signals from the keyboard board? Because in the intention, a separate module would be responsible for broadcasting BT.
  • #38 17850139
    piotr_go
    DIY electronics designer
    Posts: 2904
    Help: 94
    Rate: 3336
    el_wojtaso wrote:
    So there is nothing to dream about "catching" RX / TX signals from the keyboard board?

    Nothing of that. Even if the radio is in a separate chip, the data is encrypted.
  • #39 19175257
    ctfrookie
    Level 1  
    Posts: 1
    @piotr_go I am thinking about a project in which I would like to use a Logitech K270 keyboard plate to convert another keyboard (wired) to a wireless one.
    I see that the layout of the matrix for multiplexing keys is completely different than in the K270, so I thought that maybe I could reprogram the NRF31504E to the K270 (or at least change the matrix notation in the binary image).
    From your experience - do you see any serious blockers of this task (apart from the lack of source code)?
    Do you have any more NRF31504E documentation or other materials that could help me upload an image, modify it and burn it again?
    Thanks for your help and congratulations on a very interesting research :)
  • #40 19175335
    piotr_go
    DIY electronics designer
    Posts: 2904
    Help: 94
    Rate: 3336
    The NRF31504E is probably the ROM version of some SoC Nordic, programmed at the factory.
    It cannot be reprogrammed, and you will not find the program anywhere (rom versions do not have updates).
    It remains for you to design your transmitter from scratch.
📢 Listen (AI):

Topic summary

✨ The discussion revolves around the hacking of Logitech wireless peripherals, particularly focusing on the ability to communicate with and control devices like keyboards and mice. The original poster, piotr_go, shares insights on remote emulation, interception of keystrokes, and the implications of Logitech's unifying technology. Participants explore the technical aspects of Logitech's communication protocols, including the NRF algorithm and the challenges of reprogramming receivers. Various Logitech models are mentioned, with discussions on compatibility, encryption, and potential applications for robotics and security. The conversation also touches on the limitations of existing hardware and the potential for firmware modifications.
Generated by the language model.

FAQ

TL;DR: 100 % of Logitech nRF24-based dongles are rated for only 1 000 flash cycles, so “you pay extra for a better soft in the receiver and that's it” [Elektroda, piotr_go, post #15480774] Logitech’s 2016 patch does NOT stop keystroke injection demonstrated in this thread [Elektroda, piotr_go, post #15473003]

Why it matters: Knowing chip limits, firmware quirks and attack vectors lets you repair gear—or secure it—before surprises strike.

Quick Facts

• Unifying receivers can pair with 6 – 8 devices in one USB port [Elektroda, Sas_AS, post #15480117] • Red-border (non-Unifying) dongles usually handle only 1 – 2 devices [Elektroda, Sas_AS, post #15480117] • nRF24LU1P on most dongles: ~1 000 program/erase cycles [Elektroda, piotr_go, post #15480774] • Replacement Unifying dongle street price: PLN 25 – 40 (≈€6 – 9) [Elektroda, Sas_AS, post #15480842] • Tested control range: one average room (~5 m) [Elektroda, piotr_go, post #15479305]

What makes Logitech Unifying different from older red-border receivers?

Both use 2.4 GHz, but Unifying firmware lets one dongle talk to up to eight devices and stores multiple AES keys; red-border models store at most two keys and lack the multi-device protocol [Elektroda, Sas_AS, post #15480117] Hardware is often identical (nRF24LU1P or CC2544), the distinction is software.

Which RF chips are inside the various nano receivers?

Thread teardowns show: nRF24LU1P (newest orange, F710, 500 Hz); CC2544 (some Unifying and old red-border); nRF24L01 + Atmega90USB162 (very early models) [Elektroda, Sas_AS, post #15479526]

Is the wireless traffic encrypted?

Keyboards use AES-128; mice/pads often send unencrypted movement packets [Elektroda, piotr_go, post #15497992] Attackers who capture the pairing can decrypt keys; otherwise they can still inject because receivers accept properly-formatted packets without authentication after pairing.

Does Logitech’s MouseJack patch stop the attack shown here?

No. Piotr_go confirmed his method still works after the official patch: “the released Logitech patch does not block my way” [Elektroda, piotr_go, post #15473003] The fix tightened channel filters but did not add full packet authentication.

Why does my K400/K270 stop pairing after repeated attempts?

The keyboard stores pairing data in small OTP (one-time programmable) memory. Once full, no new keys fit; only UV exposure could erase it [Elektroda, piotr_go, post #16887047] This planned-obsolescence edge-case leaves the board unable to connect to new dongles.

What range can I expect, and how can I extend it?

Standard nano receivers work reliably within one room (~5 m); F710 tests showed no “sensational” reach [Elektroda, piotr_go, post #15479305] A larger antenna or centrally-placed USB extension cable can add several metres, but walls still attenuate 2.4 GHz signals.

How do I revive a bricked Unifying receiver?

  1. Short RESET and GND to enter DFU mode (nano pads shown in photo) [Elektroda, Sas_AS, post #15479526]
  2. Run Logitech Firmware Update; if it reports “DFU receiver”, click Update.
  3. If update fails, flash known-good .bin via your custom boot-loader, then re-run Logitech software [Elektroda, piotr_go, post #15480722]

How can I detect Logitech packets amid 2.4 GHz noise?

Look for packets that pass a Nordic CRC; “The microwave oven does not send CRC” [Elektroda, piotr_go, post #15474593] Once channels and addresses match, payload patterns reveal keyboard or mouse frames.

What simple steps reduce the risk of wireless-keyboard attacks?

  1. Update dongle firmware to the latest Unifying build (e.g., 013.000.00001) [Elektroda, Sas_AS, post #15479526]
  2. Disable or unplug receivers when away; power-cycling breaks live sessions [Elektroda, george2002 & Kuniarz, #15477780-#15478301].
  3. Use strong OS logins; but remember wireless keystrokes can be sniffed, so prefer 2-FA or on-screen password tools.
Generated by the language model.
ADVERTISEMENT