Implementation and Analysis of WiFi Human Interface Device (HID) USB Using ATMEGA32U4 and ESP8266

##plugins.themes.academic_pro.article.main##

Gilang Ryan Fernandes
Ika Mei Lina

Abstract

Advances in technology have resulted in hacking occurring everywhere. Hacking is the act of illegally accessing data and information. It is not uncommon for many hacking cases to harm various parties due to ignorance. The results of hacking at this time are widespread, one of which is a ransomware virus that can encrypt data, a keylogger is software that can monitor keyboard activity, and a WiFi USB human interface device which is where this attack is a virtual keyboard. This research assembles the components used for Human Interface Device (HID) by utilizing ATMEGA32U4 as a virtual keyboard and ESP8266 as WiFi media. This technique is used to obtain target information and data. This research aims to make people more careful and overcome hacking. It is hoped that people will be more concerned about system and data security. Based on the research results, WiFi HID USB attacks can be dangerous for computer owners who need to be more aware of various hacker attacks because this technique can directly take target access.

##plugins.themes.academic_pro.article.details##

How to Cite
Gilang Ryan Fernandes, & Ika Mei Lina. (2023). Implementation and Analysis of WiFi Human Interface Device (HID) USB Using ATMEGA32U4 and ESP8266. Jurnal E-Komtek (Elektro-Komputer-Teknik), 7(2), 329-335. https://doi.org/10.37339/e-komtek.v7i2.1478

References

[1] R. Canady and D. Wuidjaja, “Tindakan Hacking dan Profesi Hacker: Persoalan Etis antara Utilitarianisme dan Deontologi,” J. Filsafat Terap., vol. 1, no. 1, pp. 59–78, 2022, doi: 10.11111/moderasi.xxxxxxx.
[2] H. E. Wahanani and M. Idhom, “Serangan Hid Usb Otomatis Pada Sistem Operasi,” Pros. Semin. Nas. …, no. September, pp. 4–7, 2019, [Online]. Available: http://santika.ijconsist.org/index.php/SANTIKA/article/view/4%0Ahttp://santika.ijconsist.org/index.php/SANTIKA/article/download/4/2
[3] A. Roihan, A. Permana, and D. Mila, "MONITORING KEBOCORAN GAS MENGGUNAKAN MICROCONTROLLER ARDUINO UNO dan ESP8266 BERBASIS INTERNET OF THINGS," ICIT J., vol. 2, no. 2, pp. 170–183, 2016, doi 10.33050/init.v2i2.30.
[4] H. H. Idrus, Y. Mangarengi, and N. S. Mustajar, “Test of Polymerase Chain Reaction (PCR) Detection and The Specificity in Gen Hd Salmonella typhi in RS. Ibnu Sina,” Annu. Basic Sci. Int. Conf., no. December, p. 353, 2018.
[5] N. Budhisantosa, “Forensik Komputer Human Interface Device Badusb Berbasis Microcontroller Atmega32U4 Arduino Leonardo Pada Registry Sistem Operasi Microsoft Windows 7,” vol. 3, pp. 97–102, 2018.
[6] S. Samsugi, Ardiansyah, and D. Kastutara, “Internet Of Things (IoT) Sistem Kendali Jarak Jauh Berbasis Arduino Dan Modul Wifi Esp8266,” Pros. Semin. Nas. ReTII, pp. 295–303, 2018.
[7] M. R. Hidayat, C. Christiono, and B. S. Sapudin, “PERANCANGAN SISTEM KEAMANAN RUMAH BERBASIS IoT DENGAN NodeMCU ESP8266 MENGGUNAKAN SENSOR PIR HC-SR501 DAN SENSOR SMOKE DETECTOR,” Kilat, vol. 7, no. 2, pp. 139–148, 2018, doi: 10.33322/kilat.v7i2.357.
[8] SpacehuhnTech, “SpacehuhnTech/WiFiDuck: Wireless keystroke injection attack platform.” https://github.com/SpacehuhnTech/WiFiDuck (accessed Oct. 24, 2023).
[9] A. T. Ramadhan, A. Budiyono, and A. Almaarif, “Usb Attack Berbasis Powershell Menggunakan P4Wnp1 Pada Personal Computer Implementation and Analysis of Usb Attack Based on Powershell Using P4Wnp1 in Personal Computer,” vol. 6, no. 2, pp. 7995–8001, 2019.
[10] M. Alvian, H. Nasution, and A. T. Laksono, “Investigasi Serangan Backdoor Remote Access Trojan (RAT) Terhadap Smartphone,” JURIKOM (Jurnal Ris. Komputer), vol. 7, no. 4, pp. 505–510, 2020, doi: 10.30865/jurikom.v7i4.2301.