Amer Posted December 8, 2016 Share Posted December 8, 2016 (edited) https://www.google.com/search?q=WindTalker+&ie=utf-8&oe=utf-8&client=firefox-b#q=wifi+WindTalker+ What is WindTalker & how does it work WindTalker is the name given to the method that allows parallel scanning of WiFi signals arising out of the victim’s device to retrieve the data being typed on the device. The first part of the method is to identify the signals coming from the victim’s device. Note that the hackers do not need any software to be installed on the victims’ phones or other devices that they intend to hack. The second requirement is to be able to use the WiFi network. This could be easy at public places where they have free WiFi. If not, the hackers can create an ad hoc rogue WiFi network and offer it as free WiFi. Once the victim falls for it and connects to it, the work of stealing information is half done. The final thing to do is to check the movements of the fingers of the victims. The directions and pace with which the victim is moving his or her fingers and when she or he is pressing key(s) are noted down. This gives away the data being typed by the victimRestrictions of WindTalker The first thing that can spoil hackers’ attempts if the victim disconnects from the WiFi before the input and input pattern is decoded. But the method is fast, so chances are the hackers will succeed in their endeavors. The requirement of having to connect to the WiFi network makes it a bit hard. In cases where free and public WiFi is not present, the victims will have to create a public network which is not very hard to do. Anyone can create a public WiFi using their Windows or Android phones, tablets. Both operating systems have the option to create mobile hotspots and are easy to set up. Once the WiFi is set up, it is not difficult to have people connecting to the FREE OPEN network. Device models also play a part in processing data: i.e. monitoring the finger movements of the victims. Since the shape and size vary across different phone and tablet devices, it takes a bit to understand the keystrokes being sent on the WiFi. For example, the keyboard of an 8-inch device will vary from an 11-inch device and so it may take some time to understand the movements. Other than the above, there were no restrictions and requirements of WindTalker that I could notice: “WindTalker is motivated from the observation that keystrokes on mobile devices will lead to different hand coverage and the finger motions, which will introduce a unique interference to the multi-path signals of WiFi” the researchers say. Simply put, WindTalker monitors finger movements and provides hackers with whatever is being typed on the victim device. WindTalker – Details Here is a video that will help you understand the concept of WindTalker in detail: Edited December 8, 2016 by Amer Link to comment Share on other sites More sharing options...
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!Register a new account
Already have an account? Sign in here.Sign In Now