Login or create an accountClose
I am a returning customer
Login or create an accountClose
Your Account Has Been Created!
Thank you for registering with TechMaze!
You will be notified by e-mail once your account has been activated by the store owner.
If you have ANY questions about the operation of this online shop, please contact the store owner.
You have been logged off your account. It is now safe to leave the computer.
Your shopping cart has been saved, the items inside it will be restored whenever you log back into your account.
BadUSB USB VIRTUAL KEYBOARD DEVELOPMENT BOARD ATMEGA32U4
The new generation "Beetle" controller derives its core notion from minimalism without compromising functionality. It comes with Atmel AtMega32u4 (datasheet) @16MHz clock time and has expanded amounts of interfaces: 10 digital pins, 5 analog pins and 4 pwn pins. To further make it user-friendly, it is compatible with Micro USB so that direct programming and testing is no longer a headache. Select "Arduino Leonardo (tools >board > Arduino Leonardo in Arduino IDE), the ATmega32U4 comes preburned with a bootloader that allows you to upload any new code that is applicable to Arduino Leonardo.
As a minimalized version of Arduino Leonardo, it enjoys similar powerful functionalities. Beetle aims to solve problems of low-cost controller, ease-of-use, and to provide a low cost solution for disposable projects, such as DIY projects, workshops, gift projects, E-Textiles and educational. For students and makers who can not afford too much on hardware purchasing, Beetle can be a great solution for them.
- Microcontroller: ATmega32u4
- Clock Speed: 16 MHz
- Operating Voltage: 5V DC
- Digital I/O Pins: 10
- PWM Channels: 4
- Analog Input Channels: 5
- UART: 1
- I2C: 1
- Micro USB: 1
- Power Ports: 2
- Flash Memory: 32 KB of which 4KB used by bootloader
- SRAM: 2.5 KB
- EEPROM: 1 KB
This Module can be used for making a Virtual keyboard or Hacking !!
BadUSB is a dangerous USB security flaw that allows attackers to turn a simple USB device into a keyboard, which can then be used to type malicious commands into the victim's computer.
It was first detailed at this 2014 Black Hat conference by security researcher Karsten Nohl; now, it has been released to the public for all to (mis)use.
Originally, Nohl decided not to release the BadUSB code publicly, fearing that the exploit could not be easily fixed.
“These problems can’t be patched. We’re exploiting the very way that USB is designed,” he told Wired in July.
But security researchers Adam Caudill and Brandon Wilson, who presented their findings in last week's DerbyCon conference in Louisville, Kentucky, have managed to hack the USB firmware in a similar way to Nohl and his team at SR Labs — and they've released the code to the public via GitHub.
How it works
BadUSB revolves around the fact that many different devices plug into the same USB connectors. By hacking the code of the USB micro-controller of an "innocent" device, like a USB memory stick, you can turn it into something far more capable, such as a keyboard or a
network card. Stick the device into a computer and it could execute commands or even a malicious program without the owner knowing. Stick the device into a computer and it could execute commands or even a malicious program without the owner knowing.
This is made worse by the fact that malware scanners cannot access the firmware running on USB devices, meaning they cannot fix the problem.
Adam Caudill provided an explanation of the core of the issue in his DerbyCon presentation.
"When a user looks at a thumb drive, what they perceive is nothing more than a storage device. But that's obviously an oversimplification," he said there. "It's effectively a computer — a programmable computer [...] It can be programmed to be anything."