Deliver to UK
IFor best experience Get the App
The AirDrive Forensic Keylogger Cable is an ultra-discrete USB keylogger embedded in a USB extension cable. It can be accessed with any Wi-Fi device such as a computer, laptop, tablet, or smartphone.Records keystrokes from any USB keyboardUltra-discrete keylogger, minimal risk of exposureStores 8000 pages of text16MB internal flash memory100% stealthy, undetectable for security softwareSupports over 40 national keyboard layoutsCompatible with barcode readersWorks as a Wi-Fi hotspotConnect from any computer, smartphone, or tabletAccess keystroke data from web browser, no software or app necessaryRetrieve data remotely without touching the deviceSimple and clear WWW interfaceSupports WEP, WPA, and WPA-2 network securityMemory protected by hardware encryption
T**S
Overall functional, but some quirks
They do what they're supposed to, and they capture well and have adjustments for some of the more problematic keyboards. However, I'd recommend turning off DHCP on the client that connects to it since the onboard DHCP can be problematic (It's a /24 network, just set a static to 192.168.4.2 since that's the address it would assign you anyway).Additionally we have seen problems when using hidden network modes, unless you have a clear line of sight. We do not see this otherwise, and have used names such as "X's iPhone."It only supports WPA2 as the strongest auth, which can be broken but eh it's an embedded device and WPA3 is still pretty new.
B**E
Perfect!
I love the product! Caught my daugter in her mess.
A**Z
Works Perfect
Just a little hard to understand how to use at first
E**.
WIFI seems like a cool feature, but it actually negates the devices strongest feature: Stealth
*** CAUTION/DISCLAIMER - I got a little carried away and wrote a novel on the functionality flaw that kills this device from being one of the most stealthy key loggers ever made, or at least from ones sold retail. If you're ok with dedicating a portion of your life to reading the intricacies on this, feel free to read on.If NOT, skip to the conclusion section at the end which compresses the meat and bones into a short story : ) You will miss out on the CONCLUSIVE, REALISTIC approach I used to put the reader in the seat of the victim being key logged by this device!<!---- START HERE ----!>Ok, so I get the overall concept as to why the company who made this device decided to add wifi capabilities to it. Yes it does allow you to wirelessly extract data and yes that is easier than having to manually plug in through USB. HOWEVER, it decreases the overall stealth of the setup and can increase the alertness of the victim to something not being quite right. Let me try to help you understand where I'm coming from (or rather the victim of the attack).So let's say you've been sitting at the same desk for a year now, you've been using the same computer, same devices with it and you work off it 7-8 hours every day. While you go get some coffee, I sneak in and plug one of these into your computer and I disappear out of sight, you never see me and you definitely don't notice this foreign "extender" device plugged in as it looks just like the cord next to it. At this point, the "pen tester" should be 100% set right? Not quite. So you (the victim) continues working like normal and out of nowhere your internet stops working for whatever reason which is a common occurrence amongst users of computers + internet. What do 99% of people do when their internet stops working? They click on the wifi icon to see if they are connected. Ok, so you click on it and you're going through the list of the same 3 wifi signals that have been showing up for the past year day in and day out...except now you see a 4th choice. Not only that, but this 4th choice stands out as its showing with full signal strength (as the device is literally next to your wifi card antenna). You think to yourself, thats very strange...my router doesn't even get full strength and my router is two rooms over. That must mean its coming from somewhere in this room......(finish the story however you want to).You see where I'm getting at with this? Again, this is an EXAMPLE situation using general occurrences, however the point I'm trying to make is that the wifi functionality built into such a device is counter-productive and significantly decreases your chances of success. Yes, you do get an easier way to transfer logged data once you've logged enough keystrokes, however this doesn't even matter if the victim sees the wifi signal unknown to them and they start becoming weary/alert to their surroundings. It only can get worse from there, which can eventually lead to the device getting found, and in my books that is the ULTIMATE fail at least when it comes to keylogger attacks. What the manufacturer needs to realize is that they spent all this time figuring out a way to make this key logger as stealthy as possible (meaning they understand the importance of stealth in such an attack), only to undo the majority of it with a wifi connection that is just constantly repeating it's unknown name until the victim sees it or you remove the device after your successful op. Regardless of what you type in as its SSID, if the victim hasn't seen the name before it will draw curiosity at the very least when you are wanting them to think everything is normal while the attack is underway. Furthermore, as I just stated above, this whole scenario essentially ends when either the victim starts building curiosity which over time turns into suspicion, or, the attacker decides to extract the data and come retrieve the device. The "key" word here (no pun intended) being RETRIEVE. Yes, I am fully aware that you have the option of leaving the device plugged into the victims computer however I'm pretty confident that it's unlikely that anyone will do this given its a $40 re-usable item. It would also be stupid to just leave it connected once you've gotten what you were going for as eventually it WILL be found if the victim has any sense or can understand very basic concepts on how wifi works. You may have covered your tracks and check that list twice, but are you 100% sure that you thought of everything the victim might be able to use to get one step closer to finding out who the attack came from? After all, a few leaps turn into bounds.---- CONCLUSION ----So I say all of this to essentially say this: Great idea to integrate a key logger into a USB extension cord rather than a random dongle that looks like a flash drive that the victim will immediately deem sketchy if they see it. This device seems to easily pass both a quick pass of the victim seeing it as well as even harder looks at it during normal use of their computer. I wouldn't even doubt if they aclly thought it was a USB extender while handling it themselves to plug a device in. HOWEVER, a significant portion of this is negated by the fact that the device essentially tells on itself through broadcasting its wifi SSID to the victim. No bueno, you might as well just take your chances and either put a software key logger on a USB device or buy a cheap one that essentially does this for you in the form of a dongle. Personally, I think that I'd rather take my chances with an easily identifiable dongle key logger to someone who knows their way around such devices and just plug it into the back of their computer over using something like this that can pass the visual test with flying colors, but essentially asks "WHERE'S WALDO?" over and over again...you're going to most likely look for him and eventually find Waldo. Again, I totally get what the manufacturer of this device was trying to do, and probably was thinking "why don't we make this both convenient AND stealthy?" - Well, I hope I was able to answer why not in the short story I wrote above. I think a more acceptable solution to using wifi for the intended functionality would be to use bluetooth instead (not in conjunction with, obviously). Yes, wifi obviously has better range than bluetooth however given the physical limitations, power constraints, etc I think bluetooth and wifi would actually perform pretty evenly in terms of use range. And of course, the benefit to using bluetooth is that it isn't used as much as wifi (generally speaking, at least) and you'd have to put the device into pair mode for it to show up in the victims available bluetooth devices list at all. This, imo, would have been acceptable and serviceable for its intended use. However the current version to me is merely a novelty/prank item and maybe a proof of concept. I definitely would not use it in this configuration if the device being found by the victim would impact my life negatively in any way (specifically due to the wifi). Too risky for me, and I'd assume it would be the same for anyone who (i)legitimately was depending on the success of acquiring the logged data on the device once its been collected. Normally I don't write novels over such things, however this really stood out to me for some reason as clearly someone (or team) put some thought into it only for it to turn out to be a bit of a contradiction and liability for coolness more than functionality. Because lets face it, in reality how much easier is it to connect "wirelessly" to a device via wifi as opposed to plugging in a USB to your computer EVEN WITHOUT factoring in the possibility of it being spotted as a malicious device. When I explain everything now, it doesn't make sense does it? Nice try whoever made this - You get an A for effort, but unfortunately effort is not enough in this case. Hopefully the manufacturer will take this feedback constructively and the next iteration will address this flaw, to call it lightly so that it can be a super-stealth "field ready" key logger. I may be the first to actually waste 30 minutes of my life to writing a novel on it, but I'm sure there are many others who have noticed it too and just haven't cared enough to write about it. My one review should cover all the others who noticed it :)- The End
L**S
Capture the keys without the struggles of software.
The key logging cable works as advertised and had proven very helpful. My only complaint would be the strength in the plastic casing which developed some cracks even when carried in a bag and not abused.
Trustpilot
2 weeks ago
1 day ago