Skip to main content

Wiggling your pointer with a Mouse Jiggler

What is a Mouse Jiggler?

A mouse jiggler basically simulates physical movement of your mouse to prevent the computer from going to sleep, the screensaver from starting or the screen from turning off. They can also be handy if someone measures the idle time on your computer and you need to look busy, just saying.

Law enforcement use them to stop laptops and servers from going to sleep when making "lights on" arrests. This is especially important to avoid losing hard drive encryption keys. They have also been used by companies wishing to maintain access to machines that they dont have the password for when employees leave.

If the machine is awake, we can keep it that way with a mouse jiggler.

There are basically two kinds, hardware and software. Hardware devices retail for $20-$40 but you can make your own for less than $6.

All you need is some kind of ATMEGA32U4 arduino device. A quick check on ebay/amazon will reveal dozens of devices in all different form factors. Personally I like the slightly incognito devices like these:



The code used is very simple. When you plug it in it simulates a human interface device and moves the pointer back and forth every second. The movement is small enough and slow enough that the machine is still usable for anything but graphics work.

Here is the script but it's also on github:

/*
 * Mouse Wiggler
 * To Keep machines from going to sleep
 */

#include "Mouse.h"

int mouseStep = 5;       // Distance to move mouse
int loopDelay = 1000;    // Loop delay in ms


void setup() {
  // Initialize mouse control
  Mouse.begin();
}

void loop() {

  // Define mouse movement
  int  dx = mouseStep;
  int  dy = mouseStep;

  // Reverse direction next time
  mouseStep = -mouseStep;

  if ((dx != 0) || (dy != 0)) {
    Mouse.move(dx, dy, 0);
  }

  delay(loopDelay); // Delay so the mouse doesn't move too fast:
}

Compile and upload. For $6 you can keep a machine alive indefinitely... until you run out of power.





Comments

Popular posts from this blog

Snagging creds with Raspberry Pi Zero and Responder

So this is not all my own original work. This is a bringing together of the ethernet gadget tutorial by lady ada at adafruit and the beautiful work by Mubix at room362 which uses Laurent Gaffie's from SpiderLabs responder.py scripts.

I'm still using Mubix's recipe of USB Ethernet + DHCP + Responder == Creds but here we are using a £4.00 Raspberry Pi Zero instead of the USB armoury or the HAK5 LAN turtle. Both are awesome products.

Please note that this only works on the RPi Zero. Other RPi's will not work!

1.0 Setup the the RPi Zero for Ethernet over USB
Download and install the latest Jessie Lite from here onto an SD Card.

Pop the card out of the card reader and re-insert it to mount it. Take your favorite text editor and edit the following two files in the boot partition.

config.txt Go to the bottom and adddtoverlay=dwc2as the last line:



Save the config.txt file.

cmdline.txt After rootwait (the last word on the first line) add a space and then modules-load=dwc2,g_ether


Munging Passwords

Password munging is the art of changing a word that is easy to remember until it becomes a strong password. This is how most people make up passwords.

Munge stands for Modify Until Not Guessed Easily.

The trouble is that it doesn't work very well. We can guess the modifications.
Password selection.
Take the average office worker that is told that it's time to change their password and come up with a new one. They have just been on holiday to New York with their family and so following common advice they choose that as their password.

newyork

No! They are told they must include capital letters

NewYork

No! They are told they must include numbers

N3wY0rk

No! They are told they must include a special character

N3wY0rk!

There, now that's a password that meets security requirements and our office worker can get on with their actual job instead of playing with passwords.

Scripting similar munges
There are a number of ways that they could munge their password but the vast majority ar…

Anatomy of a phishing campaign

This is the story of a phishing email that came across my desk. It's good to take a look at what the bad guys are doing sometimes. It's often not rocket science but it's handy to keep an eye on the simple techniques used. And if this isn't your day job you probably don't get forwarded a huge number of phishing emails, malware to analyse or dodgy sites to investigate. In fact hopefully you do your best to avoid all of those things.

The Attack Chain So this particular phishing campaign started as many others do with a simple phishing email.


It's not an aggressive email, it's not selling itself too hard, no spelling mistakes, no funny looking URLs and it's pretty simple. There's only one link to click on.

Just a quick note here about clicking on links in nefarious emails. Don't do it unless you are ready to. This link could trigger some malware, it could be unique to the targeted email (so the attacker knows the email address is valid), it could p…