Living in a fools wireless - secured paradise Stefan Kiese Topics - - PowerPoint PPT Presentation

living in a fool s wireless
SMART_READER_LITE
LIVE PREVIEW

Living in a fools wireless - secured paradise Stefan Kiese Topics - - PowerPoint PPT Presentation

Living in a fools wireless - secured paradise Stefan Kiese Topics Wireless (consumer) alarm systems Hardware Software Hacking it ;) 2015/10/02 Stefan Kiese 2 About me Security Analyst @ ERNW Heidelberg, Germany


slide-1
SLIDE 1

Living in a fool’s wireless- secured paradise

Stefan Kiese

slide-2
SLIDE 2

Topics

  • Wireless (consumer) alarm systems
  • Hardware
  • Software
  • Hacking it ;)

2015/10/02 Stefan Kiese 2

slide-3
SLIDE 3

About me

  • Security Analyst @ ERNW
  • Heidelberg, Germany
  • Interested in hardware

hacking, SDR, IoT

  • Beard ;)
  • Twitter: @net0SKi

www.ernw.de www.troopers.de www.insinuator.net

2015/10/02 Stefan Kiese 3

slide-4
SLIDE 4

Wireless (consumer) alarm systems

  • Cheap ($10 - $250)
  • Easy to get
  • Easy to install
  • WIRELESS
  • Mostly, you get what

you pay for

2015/10/02 Stefan Kiese 4

slide-5
SLIDE 5

Hardware Tools

2015/10/02 Stefan Kiese 5

slide-6
SLIDE 6

2015/10/02 Stefan Kiese 6

SDR: HackRF One Yardstick One

Pix‘ sources: HackRF+YS, greatscottgadgets.com LogicPort, pctestinstruments.com MSO2012B, tek.com JTAGulator, jtagulator.com Bus Pirate v3, dangerousprototypes.com

Logic Analyzer: Intronix LogicPort LA1034 Scope: Tektronix MSO2012B All-rounder: JTAGulator Bus Pirate

slide-7
SLIDE 7

Software Tools

2015/10/02 Stefan Kiese 7

slide-8
SLIDE 8

2015/10/02 Stefan Kiese 8

Audacity: GNU Radio Companion: Other useful tools:

  • E.g. minicom (for use of JTAGulator and BP)
  • Sigrok or other LA-soft
  • Baudline
  • Rfcat
  • Python
slide-9
SLIDE 9

Usual attack vectors

  • Hardware:
  • UART (Debug info,

console)

  • SPI (e.g. r/w EEPROM)
  • JTAG (e.g. r/w flash,

reprogram µC)

  • I²C (e.g. comm. w/

components)

  • Over the air:
  • Wifi
  • Bluetooth
  • Proprietary protocols

2015/10/02 Stefan Kiese 9

slide-10
SLIDE 10

Comparison of the alarm systems

AS 1

  • Many

unidentified TPs exposed

  • Simple

record&replay

  • Costs about

$100

2015/10/02 Stefan Kiese 10

AS 2

  • JTAG + UART

exposed as TP

  • Also simple

record&replay

  • Costs also

about $100

AS 3

  • No interfaces

exposed

  • Rolling Code

implemented

  • EEPROM
  • Costs about

$60

slide-11
SLIDE 11

Alarm system 1

Loooong transmissions…

2015/10/02 Stefan Kiese 11

slide-12
SLIDE 12

Alarm system 1

  • 1. Let‘s start with a simple

record&replay attack  successful

  • 2. Trying to regain the RF

transmission  288 Bits x 90, Manchester encoded

  • 3. „Synthesizing“ signal in

GNU Radio  successful

  • 4. Manipulating messages

 unsuccessful

2015/10/02 Stefan Kiese 12

slide-13
SLIDE 13

2015/10/02 Stefan Kiese 13

slide-14
SLIDE 14

2015/10/02 Stefan Kiese 14

slide-15
SLIDE 15

Alarm system 2

You shouldn‘t be allowed to issue this CMD, dude!

2015/10/02 Stefan Kiese 15

slide-16
SLIDE 16

Alarm system 2

  • 1. Record&replay again…

 successful

  • 2. Motion Detector is

allowed to disarm the base  Just bruteforce the Device ID

  • 3. JTAGulating UART

 2 UARTs exposed, no „valid“ output on common baudrates

  • 4. JTAGulating JTAG

 unsuccessful

2015/10/02 Stefan Kiese 16

slide-17
SLIDE 17

2015/10/02 Stefan Kiese 17

slide-18
SLIDE 18

Alarm system 3

Keep on rollin‘, baby!

2015/10/02 Stefan Kiese 18

slide-19
SLIDE 19

Alarm system 3

  • 1. Record&replay again…

 unsuccessful

  • 2. Trying to regain the RF

transmission  65 bits x 6, two- parted Rolling Code

  • 3. Some interesting

unlabelled ICs on PCB 

  • acc. to russian board
  • ne for signal horn
  • 4. EEPROM

 Connected to µC via SPI; no results yet

2015/10/02 Stefan Kiese 19

slide-20
SLIDE 20

2015/10/02 Stefan Kiese 20

slide-21
SLIDE 21

What could vendors do better?

  • Use Rolling Code
  • Remove IDs from ICs
  • Use two-way

communication

  • Use encryption
  • Be aware of the comm.

protocols

  • Use anti-tampering

techniques

  • Send keep-alive packets

2015/10/02 Stefan Kiese 21

slide-22
SLIDE 22

Any questions?

2015/10/02 Stefan Kiese 22

slide-23
SLIDE 23

Thanks for your…

2015/10/02 Stefan Kiese 23

…and have a nice day!