KeyGrabber WIFI Air (by KeyDemon)

Reviewed Oct 2019 by Jon Munsey


1. About This Review

So what have we here, a hardware device that fits in between a USB keyboard and the computer it is plugged into.  It then logs keystrokes, with some interesting methods for covertly getting the keylog files off it once installed.


Surveillance is an interesting part of our world and as I am in partnership with various Detective Agencies, they often have a need for cool toys to catch a crook !


I bought this device on Ebay about six months ago and never got round to using it, I kept it in the same drawer as a certain dongle that went faulty a while back :) so this is not a paid or sponsored review.


2. The Gotcha!Pro Tip & Quick Quiz System
If I come across anything that may catch you out and cause you problems, you will see a Gotcha! warning, if I think of anything that I think some readers may benefit from, I'll put in a ProTip !  Also if you feel like a bit of trivia, have a go at  the QuickQuiz and submit your answer in the comments for the chance to win amazing prizes.
KeyDemon Flyer


3. About the vendor


KeyDemon have been around on the web since 2009, so they are certainly not new to this market.  It seems their distrubutor for europe is "Electroware", based in Poland.  It also looks like they are a Chinese based manufacturer, whether or not they are the original developers of the software inside their devices, or these are knock-off, who knows.


UPDATE:  It seems like quite a lot of Keyloggers in all shapes and sizes are using the same microcode as the KeyDemon products, so someone ripped off someone, somewhere.


4. Feature Overview


As you can see below (click to enlarge), the Keygrabber Air USB has some interesting features, most notably;


- Records keystokes with a 16MB Memory capacity.

- Can upload keylogs via FTP or Email.

- Can be directly accessed via WIFI to directly download keylogs.

- Live streaming of keystrokes if required.

- Offers NTP time sychonisation (Gotcha! coming up).


KeyGrabber USB Air


This device is not suitable for laptops (as they have a built in keyboard), it also "apparently" does not work on Apple computers, according to the user manual. 


Interesting as a PC keyboard works on a an Apple computer and an Apple keyboard works on an Apple device, if a client was paying I would be looking at the scan codes the keyboard is sending down the USB bus with a sniffer - but they aren't, so I won't :)


For the "Machiavelians" (roars with laughter uncontrollably!!) armchair experts, yes I know that the vendor maybe talking about the ye-olde ADB keyboards from yesteryear, but KeyDemon have a specific USB version for Apple listed on their website - so I'm confused!.


Quick Quiz:  So what does ADB stand for then ?  Kudos if you know without Googling it.  First one to comment with the correct answer before the closing date  (see bottom of page) wins an all expenses paid trip (thats hotel, meals, spending money £1000/$1000 per day and flights from anywhere in the world) to Scunthorpe young offenders institution.


Pro Tip: I could not resist it, ok, so the reason they have a specific MAC version is that some older USB Apple Keyboards use the USB 1.1 specification, which causes issues, I found this (which relates to another vendors product, not this one being reviewed) which neatly explains it;


Mac Incompatibility


5. Further Resources & Reading


The manual for the KeyGrabber is very short, but surprisingly concise - so it tells you all you need to know.  You can download it in .PDF form here or take a look below/


The manual is your usual Chinese to English translation, its not bad, and at this price point, who are we to complain ?



If you are not familliar with FTP, NTP, SMTP, SSID's and the like, then you won't be up and running with the advanced features out of the box, those will require some Googling.  However if you just want to start logging keys (Gotcha! - see the Using The Product section) you are good to go.


6. Pricing, Licencing and Renewal




£15.45/$19.99/€17.90 plus postage & taxes will get you one of these delivered to your door. 


Thats a very cheap price, considering what you are going to charge your client for doing this sort of work.  You can spend more money, but the microcontroller and its code, will more than likely be the same or fairly close to what is inside the KeyGrabber.


Licence & Renewal:


There is no licence for this product, you buy it and it is yours to use until it bites the dust and ends up in your local landfill, so no renewal either.


7. Purchasing process


So I purchased mine from Ebay at this link, but this may expire by the time you read this, so here is the main vendors website.


It took a few days to arrive, but as the postage was a paltry £3.99/$3/€3.2 I was not complaining for international shipping from Poland.


8. Product Download & Unboxing
Taking this little thing out of the package this is what we see;
Its diddy!


For a size comparison to a regular USB memory stick, below we can see this thing is tiny!  Apparently billed as the smallest in the world.


The build quality looks ok nothing is loose or wiggles around, the device is also unmarked and has no serial numbers, branding or any other marks that would arouse supicion.


9. Installation & Uninstallation


There is no software to install with this little beasty, it is plug and play, no drivers to install, nothing, zip.


10. Initial Impressions - First run


So plugging the KeyGrabber into my test machine, I'm using an old Windows 7 laptop here that I use for diagnostics over ODB on my car, its essentially an old netbook which I've used a home for eons which has been repurposed.


More on why I am using this machine later, but lets take a look at the device manager and see whats going on.


This is what we see in the device manager before we start, the keyboard listed is the internal one, so nothing unusual here;


Device Manager - Before


When we plug in the keyboard to the device, the Windows "plug and faff about" system comes to life and we now have an additional keyboard listed and plenty of HiD's (see below).  This is going to generate events in the event log and such, especially so if you plug it into a different USB port when you replug the keyboard, so watch that.


Device Manager After


None of this will be suspicious to the user as if they are using a USB keyboard, then this will all be completley normal if they come here and look.


Examining all of those HiD's and the secondary keyboard entry for a dodgy PCI Hardware device ID that the sneaky ones of you will Google to detect the device won't help you out - they all relate to the keyboard.


Device ID 5500


A quick look in the (that name keeps getting longer) also shows zero activity when the KeyGrabber was plugged in with no keyboard attached, and when the keyboard was attached, the only entries in the log file relate to that keyboard only.


So what we have here is a clever pass through device that seems to be completely invisible to the machine - well at least at the level of detail I am going into - way more than your average I.T guy who would poke around on his machine.


So far so good !


Being the uber geek that I am, I monitored file, registry and TCIP connections during the first time plug in of this device, as you can see below (click to enlarge), I don't trust anything, so I wanted to see what this thing was going to do when plugged into my machine. 


Was it going to install some malware that sends the keywords captured off to China (and yes, I've investigated a case where that happened! - millions of dollars of cancer research stolen), or was it going to switch on my webcam and video me (man, that even makes me shudder *grin*).


Sysinternals System Monitor Output


I didn't see anything untoward or malicious at all, what you see here is a text book installation of a HiD device (the keyboard) and nothing else happened that was unexpected.  Obviously this is a super short term test and naughtiness may take place at other intervals.


If you fancy reading about the Human Interface Device protocol and specification, take a look here.


Perhaps we will see something interesting when we hook this thing up to the internet and get it to E-Mail and upload logs via FTP!


11a. Using The Device - Logging Keystrokes

So, now this device is connected up to my test machine, lets have a look at the Wifi side of things.


As we can see below, Windows is detecting a WIFI network AP001, this is KeyGrabber's built in WIFI making itself available for intial configuration;


Initial SSID


Obviously you need to configure the KeyGrabber, before you plug it into your target machine, otherwise you have just left a nice tit-bit (does that translate from British English ?), ok a "bread crumb" for anyone who is looking for this thing.  It stores the config on its internal flash RAM.


Connecting to this network and accessing takes you to the devices Admin console as you can see below;


Web interface


The first thing needed is to change the SSID of the system to something less conspicious, so lets choose WIFILOGGER.  I'm kidding around here, don't set it to that, my tip is look at the WIFI networks in the vicinity and name it in a similar way in an attempt to blend in, but you really don't want this thing to be transmitting when deployed.


There are a number of options here, you really need to enable "Hide SSID" so that this device does not appear to the target machine's WIFI adapter or anything nearby (such as the targets phone, tablet etc..).


You can still connect to the KeyGrabber, simply manually create a network connection and type in the SSID and password.


This keeps things extremely simple and once set up like this, chances of detection are very low.


Feature request - This admin page needs to be password protected, so that if you are rumbled, there is no way to access the device to see what it does, or access the logs it contains.


WIFI Signal:


Taking a look at the wifi spectrum, in the 2.4GHZ range where the KeyGrabber operates, we can see it pumps out a strong signal at close range, I didn't try this over any distance, but from these numbers I would imagine you would easily be able to sit outside a property or office in a car and connect without range being an issue.  


ProTip: 2.4Ghz technology is old school and is essentially the 802.x "54g" standard in this implementation, this particular frequency is great for distance, but not so good at punching through solid objects, such as walls or anything reinforced with steel girders or mesh.  Had this been a 5Ghz device, opeating on the current "a/c" standard, then you would have had less range and better pentration through walls - worth considering when deciding which standard to use on a target computer.


Wireless Signal Strength


Turning off the SSID broadcast now semi anonymises our keylogger (blue signal with white line through below), which is exactly what is needed !


SSID Hidden


If you wish to use advanced features such as FTP, E-Mail and NTP, then you need to use WIFI Client mode;


Wifi Client Web Interface


This essentially connects the KeyGrabber to a WIFI network that is within range of the target machine.


If there is not one, perhaps think about setting up one in the room next door, or even a mobile/cell phone hotspot set up on a phone in your car in the car park outside!


Obviously connecting a £20/$20 network device running code which you know nothing about, to a clients network, is perhaps not the best idea in the world, but hey, I'm not your boss.


Most of the "Save" buttons in the web GUI are hit and miss, meaning you click them to save and then are unsure as to whether those changes have been saved.


What is really happening here is the micro-controller in the KeyGrabber is rebooting (like your router used to when you applied changes) and there is no pretty "please wait rebooting" or other form of progress bar.  If you remember to click save and then wait about 60 seconds, you should be good to go.

11b. Using The Device - FTP & E-Mail Log Transmission
Giving some chinese E-Bay dodgyness device access to the internet is always going to be bit of a gamble (look at Huwei!), but then again, most anything you buy like this is most likely to have been at least manufactured in China.
Using the test mule machine, I connected it up and this is what happened;
FTP Log Transmission:
FTP log transmission is configured from the web interface;
FTP Log transmission setup


This worked a treat for me, as long as the machine was powered on it connected to the Internet via a WIFI connection to my router.  I don't know if this would connect using SFTP which would be the sensible way to send out keystrokes, but you can change the port number, so that is a maybe!


I examined the traffic and did not see anything straying off to where it should not go, but you pays your money and takes your chance here.


Email Log Transmission:


Setting up the Email method of transmission is also very simple and done from the web interface.  Remember that the attachment limit is somewhere around 25MB for a Gmail attachment, going over that amount and your log files won't reach you.

You can find the exact limits by reading the Forensic Email Extractor review!


E-Mail log transmission setup


This also worked well, I had to enable the "allow less secure devices to connect" option on the test Gmail account I used, but once done, the key logs came in no problem.


11c. Using The Device - USB Storage Mode


Its possible to connect to the KeyGrabber by just pressing K B and S at the same time, this causes the USB device to reboot into Mass Storage mode.  It then appears as a removable drive and you can access the LOG.TXT file directly from any Windows or Apple computer.


From this we can see that there is no security protecting the file, nor is there any fancy compression to allow for very long deployments.

12. Log files
The KeyGrabber stores its captured keystrokes within its 16MB of memory, which does not sound like a lot, but at roughly 16,777,216 bytes (characters), that is quite a lot!
I would imagine this is using ANSI characters as opposed to UNICODE (which would require two bytes per character) and if your target machine is using a non-standard codepage/language (such as cyrillic, chinese etc..) I think you would see mush in this log file.  If you would like to read a bit more about these two standards, have a look here.
As you will see below the text stored includes some descriptions for each key and various time stamps, so I would imagine that this would eat away at the total amount of keystrokes that can be stored, but as there are a lot of variables here, I can't be any more precise.
The log file is presented upon logging in to the admin console of the KeyGrabber, and time stamps seem to be updated when the device is plugged in and out, plus at an unspecified interval if the KeyGrabber is plugged in for a long time.


Gotcha! You will need to ensure that you enable "Log Special Keys" otherwise you wont see keys such as CTRL, ALT or the Windows Key - which may be important to your investigation.


Gotcha! Wow, two in a row, you also cant set the time or date on the device, unless you give the device some form of internet connectivity (covered elsewhere in the review).  As long as you note the time in the log file at installation, you can translate the time easily to the correct local time.  You also have to factor in that when the computer the device is connected to is powered off, the clock will reset back to 12:00 01/01/2000.  The log file is written to sequentially, so even after a power down, the log file is still chronologically recorded and the most recent keystrokes are appended to the end of the file.


This is perhaps an oversight by KeyGrabbers developers, but I think it is down to the fact that there is no room inside the device for a real time clock or battery to power it when the device is without power (when the computer it is plugged into is powered off as an example).


There are other versions of the device available that do have a real time battery backed clock (see the Alternative Products section), but these don't come with WIFI connectivity of any kind.  So you need to pick the correct features for your application.


13. Stability & Bugs
Stability of this product is not good, in fact, I would go as far to say that there are bibilical levels of instability, this is almost as bad as "Having more than one case open at the same time in Encase 7" stability.
The WIFI signal in the KeyGrabber intermittently drops away to nothing and stays there until it feels like coming back.
My theory is that the chip is overheating and thus simply shuts down when it reaches overload temperature, cools a little and then resumes transmission.  However this could just be buggy code that causes the device to reboot when an exception occurs.  What do I know anyway ?
The first time you realise something is wrong is when you get time out messages when trying to connect to the admin interface;
Connection timeout


I did not notice any issues with the actual logging of keystrokes (they were all there - even when the WIFI signal had shut down), so this is not a total disaster, just a right PITA when you are standing in the corridor outside of a mob bosse's office, trying to download the key stroke log file.


14. Support and warranty
So I sent the vendor an E-Mail explaining that the device was experiencing issues, I received no response, so if you are looking for customer service, look elsewhere.
I will update this section if they have the decency to get back to me, but at the moment its a case of pile em high , sell em cheap, we got your money, now beat it.
UPDATE: After a week, still no response, I chased it up again, this time banging the CFRO drum and explaining that they have an opportunity to save some grace before this review was published.... I heard nothing (as expected).


15. Updates and Bug Fixes

There are no bug fixes or updates available for this product, it seems that the device has no re-writeable firmware -  or at least there are no updates available from the vendor.


16. Long Term Review Updates
I won't be coming back to this product, this is a one time look!
17. Alternative Products

KeyDemon have some interesting products on their website, which I would love to get my hands on and play with, they are all in the image gallery that follows.


KeyGrabber Module - This one is interesting, you can take apart the target's keyboard and wire this inside, its just the 4 USB wires that you will be splicing this into, so easy peasy and ingenious!  Providing it does not lock up and hang, this could be a good one.


VideoLogger - This looks like a HDMI, VGA or DVI connector, but they have some flash memory in the cable head which can capture images from the screen.  Again, I would really like to have a play with this as I would be intregued as to how they do it, there is not a lot of space in there for a cpu, it may even be some tiny FPGA chip, who knows.


Key Grabber Forensic USB - Now this is what I should have bought, its a simple USB extension cable which won't look out of place if connected to the target computer, in fact, its a lot less suspicious than the KeyGrabber that I'm reviewing here.


KeyGrabber USB Keyboard - This is possibly the daddy of all of their keylogging products, why faff about with adapters or cables, when you can get a complete keyboard (albeit sh*tty quality) which has all of the functions built into it out of the box.  


18. The Verdict & Score
Welly welly well my old tolchocks, this product started out really well, but once I started to poke around and use it, things swiftly took a nose dive.
Whilst the hardware design of the unit is good and build quality is fine, it appears the software was designed by someone who didn't pay attention in "user experience" class.
The final nail in the coffin for me is the stability - it is just not there.  You can't really use this for anything other than curiosity.  But then, hey this is £20/$20 so what do we expect for that price?
That lack of a RTC is a royal pain in the backside, I hear what they are saying about space, but I don't care, its 2019, sort it out !
I think KeyDemon has some interesting products and would like to explore those [get in touch KeyDemon], but sadly KeyGrabber USB Air gets the thumbs down from CFRO.


Scoring & Awards:


  Category Score (1-10)


Not Applicable
  Ease of Use 8
  Features 6
  Stability 0
  Ease of Update Not Applicable
  Value for Money 5
  Licencing Fairness Not Applicable
  Support/Warranty 0
No awards for KeyGrabber, the support was
non-existant and the product heavily flawed.

Overall Score =  4.5 out of 10


- About as stable as a potters wheel connected to a V8 Hemi.

- Super cheap, but unreliable.

- Unresponsive buttons in the GUI.

- Timestamps not recorded properly without an internet connection.

- Good luck with any warranty claims or support requests.


Competition closing date 10th October 2019




Feel free to leave a comment, please note that all comments are moderated and won't appear here unless they are deemed appropriate (to keep the loonies out!).



Please enter the code
* Required fields
There are no entries yet.

Want to Advertise ?

If you wish to advertise your company or specific products on CFRO, please visit the Advertise Here page for more details and pricing.

By sponsoring an advert on this page you can help us continue making honest and independent reviews.

Print | Sitemap
(c) 2022 Computer Forensics Online Limited - Not to be copied or reproduced without written permission.