88MPH: Digital tricks to bypass Physical security

Slides:



Advertisements
Similar presentations
Welcome Back to School!!! Mr. Sortina.
Advertisements

GCSE ICT Networks & Security..
What Are the Functions of ATM Machines?
Social Mobility Technologies for Smart Campuses PACWest Presentation 16 th May 2012.
Computer Care. The Power Cord Dont drop your laptop.
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Touchsquid Technology Inc. Setting up the TouchSquid Remote App.
Computer Basics Hit List of Items to Talk About ● What and when to use left, right, middle, double and triple click? What and when to use left, right,
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
Internet Online Safety How to have FUN and Stay in Control.
What is Radio ? Justin Champion Room C203, Beacon Building Tel 3292,
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
K-3 Alternative Safe Environment Training
1D-Star Basics. How D-Star is different D-Star radios convert your voice to digital before transmission. Additional information is included in the “digital.
ICT Curriculum Evening – an introduction to Wizkid.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
Introduction Definition of information security Importance of information security Survey Results-Bank account information Protecting your bank accounts.
Do you know how to keep yourself safe?
OUTLINE  Motivation  Introduction  Problem Statement  Assumptions  Proposed Solution  Results  Conclusions  Future Work  References  Acknowledgements.
Threats to I.T Internet security By Cameron Mundy.
Wireless Technology Wireless devices transmit information via Electromagnetic waves Early wireless devices –Radios – often called wireless in.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Methods of communication
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Using Nagios XI To Empower Your Developers To Own Their Own Checks Nick Winn Twitter: technick Nagios Forums: technick.
Number 8. Negative Numbers
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Payment Methods and Credit. In This Lesson: 1.Compare the advantages and disadvantages of using various payment methods. 2.Differentiate between a debit.
Reliability & Desirability of Data
The Impact of Communication Technology Part 2. Economic Impact Today, businesses rely on computers, high tech telephones, fax machines and local area.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Intellectual Property Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
1D-Star Network. D-Star call sign terminology The terminology is from the viewpoint of the communication link! “MyCall” is really YOUR call sign; that.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
…using Git/Tortoise Git
Intro to RTL-SDR Dallas Clements K7DCC. Agenda What is RTL-SDR? What can RTL-SDR do? How much does it cost? Software More information.
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Ignite Presentation: Near Field Communication Harry Yang.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
Data Base Systems Some Thoughts. Ethics Guide–Nobody Said I Shouldn’t Kelly make a backup copy of his company’s database on CD and took it home and installed.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
Phone Apps and Their Uses By: Deividas Vavilovas.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
Describe direct data entry and associated devices, e. g
The Before….. And After Story The first prototype of magnetic stripe card created by IBM in the late 1960s Today’s Cards.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
Radio Frequency Identification (RFID)
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Layer One challenge Biró László Miklós HA5YAR
Software Defined Radio What is SDR? Types of SDR Fun with SDR.
Hardware Attack Vectors Yashin Mehaboobe Security Researcher.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Installation and Setting up a Wireless LAN. Why would you want a Wireless LAN? Because it would take a lot of cable to set up your Internet, and a wireless.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Basic Settings Last update: February 2017
1.5 Wired and Wireless Networks
How to use the internet safely and How to protect my personal data?
Copyright © 2008 American Medical Association. All rights reserved.
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Team 7 Technical Presentation
Commercial Data Processing
Presentation transcript:

88MPH: Digital tricks to bypass Physical security ZACON IV (2012) Andrew MacPherson

WHO AM I? Andrew MacPherson (IKR) B. Information Science(2006) Paterva Script Kiddy Lazy @AndrewMohawk www.andrewmohawk.com

Why Physical Security? Sections Locks Guards RFID Magstripes Alarms / Remotes IT Security is getting a lot better (I hope) Improves at the speed of Internets Most people assume if someone can physically get to their stuff they will own it Pulling out Harddrives / Safe mode / blah Stealing laptops (ask Dominic / SP) Protections against people physically getting to your stuff: Uber slow at improving Price Not looked at (anyone know who does physical pentests in South Africa?) I’m Lazy, other stuff seems far more difficult

Whats this talk all about? Locks (quickly –demos after) RTLSDR - RF (Having a listen, Mhz!) RFID LF entry Tags – How they work, cloning HF Mifare Tags – How they work, modifying Magstripes – How they work, spoofing, cloning Alarms / Remotes – RFCat – RF (Having a chat! Hi MOM!) How they work, spoofing, spamming and jamming.

DISCLAIMER I have demos. I am not a lawyer, engineer or ham! Expect half truths! Some of the RF stuff could be in the “grey” area.

? Permissions People Who Gave me Permission Roelof Temmingh (Paterva) Sensepost People Who didn’t / Didn’t reply University of Pretoria Standard Bank (Points for effort though – thanks!) ABSA Protea Centurion / Pretoria Interpark (Menlyn) Centurion Lake Hotel Bombela (Gautrain) Centurion Mall All the res’ on campus All the local hotel lock companies

Locks Often first line of defense Padlocks / Door locks For the most part are not that difficult Often overlooked

Lockpicking 101 Images from http://www.wikihow.com/Pick-a-Lock

Lockpicking 101 More expensive locks are a not always harder Better made (pins push easier, lock turns easier) Counter-measures Anti-pick pins Different keys If you want to use locks, pay for them. Have picks + locks, afterwards! Images from http://www.wikihow.com/Pick-a-Lock

DEMO TIEMZ (After talk.) LockPicking 101: Demo DEMO TIEMZ (After talk.)

RTLSDR (Listening to Radio) RTLSDR - $20 (R160!) Software Defined Radio http://www.reddit.com/r/RTLSDR http://rtlsdr.reddit.com It’s a TV Card! RTL2832U Chip E4K Tuner Primarily devised for listening to radio / watching TV Doesn’t only do TV/ Radio Freq! ~60mhz – 1500mhz This is a HUGE space with LOADS of data

RTLSDR - Antenna Default Antenna’s DIY! Okay for FM Not too bad for remotes RTLSDR has a PAL connector Good luck finding antenna’s that fit this! F (think dstv) -> PAL available Antenna with F are avail. But generally expensive DIY! CO-AX (its almost free! Seriously! < R1 / m) Quarterplane Ground antenna Planes = (300/Mhz * ¼), so for ~122mhz = 300/122*0.25 = 0.6m

RTLSDR (Listening to the radio) HDSDR / SDR# / GRC Windows / Linux (Although my fav is HDSDR on windows) Easy to install + go What can we do? Guard Communications Tell us WHERE they are as well as WHO they are (names + OB numbers) Remote codes (later)

RTLSDR (Listening to 2 ways) http://www.ohwatch.co.za/radio-network/ “The radios use a dedicated, ICASA assigned, frequency to communicate with all OH WATCH members, South African Police Service (SAPS), City Bowl Armed Response (CBAR) and ADT” “The radios that the majority of OH Watch radio users have purchased are HYT TC 500” Common Security Company Frequencies (ask the oracle): 136-150MHz 150-174MHz 350-370MHz 370-390MHz 400-420MHz 450-470MHz Most radios are using NFM (narrow FM), this is NOT the same as FM

RTLSDR (Listening to 2 ways) DEMO – Security Guards

RTLSDR (Listening to 2 ways) What could go wrong? Security Companies often have to have guards “check in” on locations I know where they are Guards often discuss procedures, give away valuable intel on how they operate I know what they do Guards receive details on where they need to go if something happens I know if they are on to me Coupled with Lockpicking = inside perimeter

Magstripes: overview Now we are in the perimeter, getting past the doors Often places uses magnetic stripes for entry (swipe in) Same as credit cards, hotels, loyalty cards, telephone cards, gift cards, etc Magstripes are tapes! Old school! Think of it as a lot of magnets taped back to back on a strip of paper Opposite poles repel causing “spikes” in read head Can literally use a tape read head!

Magstripes: overview Normal tape head will be able “hear” magnetic stripes DEMO (listen carefully) However the tracks are at SPECIFIC heights IATA = International Air Transport Association ABA = American banking association Thrift = Thrift savings industry 0.223″ Track Density (BPI) Character Configuration (including parity) Content 0.110” IATA 210 7 bits (6+1) 79 alpha ABA 5 bits (4+1) 40 numeric Thrift 107 numeric

Magstripes: reading USB HID devices most common (found in general stores) Not everything fits common formats (although usually at right “heights”): Hotel rooms Door access Want RAW audio for that, modify TTL readers – R120! Can only record 1 track at a time :( Nice for replaying (next) DEMO: Reading WAV + decode

Magstripes: Spoofing Its those rule! (flemmings) ->

Magstripes: Spoofing Electromagnetic simulates card moving past read heads The same as headphones, instead of noise we give out magnetic pulses! Some readers have a delay (my USB HID = 1second), makes brute force tricky!

Spoofing Magnetic stripes + Brute Force Magstripes: Spoofing DEMO: Spoofing Magnetic stripes + Brute Force Magstripes = Inside the building!

Magstripes: Cloaning Done Easy MSR605 - $80 :S Windows App, clone/make cards in seconds DEMO: Cloning card with MSR605 (if we have time) Magstripes = Inside the building!

RFID 101 RFID = Radio Frequencey Identification Two common flavours Its those things you touch against the other things to open the door. Two common flavours 125 Khz / 134 Khz AKA Low Frequency (LF) tags (most used for access control) 13.56 Mhz AKA High Frequency (HF) tags Passive vs Active Generally either in FOB / Card form:

RFID 101: LF Tags Low frequency tags are often seen as “dumb” tags Usually 125Khz or 134Khz Usually Powered by electromagnetic fields used to read them (readers) Think wireless battery Once powered + Receive “shout” command Scream out their tag number (usually its also WRITTEN on the tag) Short distance (<10cm) Commonly found are EM41xx tags ASK + Manchester

RFID:Discovery Ask the Oracle :) Enter Proxmark3 www.proxmark.org Supports LF/HF tags, many decoding options etc Figuring out what kind of RFID these are? hw tune!

RFID: Discovery 125Khz FOBs Now what? Sample data, view on graph I already know its ASK + Manchester Double check anyway Binary? Look for repeating pattern Try isolate bits down, diff both tags

RFID: EM4102 EM41xx Format! Data works out to the tags! DEMO: Decoding / Encoding EM410x Tags

RFID: Spoofing Now we know format and how the data is structured! Doing it the easy way – proxmark Lf em4x em41xread Lf em4x em41xwatch Lf em4x em41xsim Opening doors: Cloning (em41xsim) Brute force? 32 bits, ouch. 2^32 = 4294967296 Keyspace really that large? Sequential tags Commonality (mine both started with 80!) Master Keys? How do the locks work? RTE! Green+White! Picture it! (zoom lense much?) DEMO: Encoding Tag

RFID: Spoofing DEMOs: Opening Normal RFID Lock Opening Real World RFID Lock (Video)

RFID: HF (mifare) 13.56 Mhz, often considered “smart” tags Used for payment systems Transportation systems – like the Gautrain ;) Data changes! Mifare classic (1K / 4K) Mifare broken in 2007/2008/2009 (ask Wikipedia) Cheap Hardware (R100 reader! – Tikitag/touchatag) Anything supported by libnfc will work

RFID: HF (mifare) Think of the cards as 40x256 byte flash drives taped back to back Each “flash drive” has 2 passwords (Key A and Key B, usually R and R/W ) Keys are 6 bytes. “flash drive” / sector 0 is NOT changeable and contains UID Passwords for this are 0x000000 and 0xFFFFFF – wut? eBay specials can be purchased which allow changing sector 0!! Entry systems usually simply work on UID, ebay cards = winners!

RFID: HF (mifare) MFOC After cracking left with hexdump – now what? Simple tool for Mifare Offline Cracking (away from where you bought the card) Issue in Parity sent in the clear! On the “anonymous” cards I have here, takes around 45 mins to crack a card After cracking left with hexdump – now what? Common formats found throughout the internets on what data is contained on these cards

RFID: HF (mifare) Formats are great! http://ov-chipkaart.pc-active.nl/Sectors Cheaper to implement someone else’s system

RFID: HF (Mifare) - My Anonymous Cards Support transactions, support credit, you pay for them Fields are VERY similar to the OV-Chipkaart anonymous format Anonymous format = buy + use ID format = buy for specific period (such as a month) Both mine and OVC have 2 money formats (check in + check out) DEMO: Reading data from cards

RFID: HF (Mifare) – Changing Data Changing data = uber simple Hex Edit + Libnfc + write DEMO: Change data, Read changed data, Write to card!

RFCAT: Having a chat! (HIMOM) RFCat - Blackhat 2011 workshop Easily my favourite talk there! CC1111EMK USB (although it is around $50-$60) Supports <Ghz range for TRANSMISSION! Interactive Python, nice for debugging Coupled with HDSDR = win HDSDR+RTLSDR for RX RFCat for TX

RFCAT: Having a chat! (HIMOM) Remotes of all kinds are great! Usually sit at 403Mhz or 433Mhz Cars, Garages, Gates Can listen with RTLSDR + HDSDR DEMO: Remotes + Recording Two kinds: Static keys, Rolling codes (almost always keeloq) Rolling codes = both parties encrypt data with known key Static keys = fixed data, sent the whole time

RFCAT: Having a chat! (HIMOM) Static keys simply repeat signal, nice to find! Most use ASK/PWM + OOK Google will tell you when in doubt :) Recorded audio needs to be replayed to open/close things! But unlike magstripes we need to give our transmitter *digital data* Decoding PWM/OOK DEMO: getting code out!

RFCAT: Having a chat! (HIMOM) Transmitting Data: Record from HDSDR Decode using Python / By Hand Get Frequency right (use HDSDR to confirm) Set params for RFCAT Profit. DEMO: Opening Remote’d Device (has relay) DEMO: Opening Real world Garage/Gate

RFCAt: Screaming / Jamming Decoding data works well with a clean sample What happens when we start transmitting while your gate/garage/car tries to decode that? Think of it as two people screaming, if one screams a LOT louder it will still work DEMO: Jamming Car Signal Audi / Volvo / VW: Spread Spectrum Jamming only works if you cover the ENTIRE range We can jam with RFCAT, but what about RFID? IT’S THE SAME MOM!

Conclusion With relatively cheap tech people can: Listen to people protecting you physically Pick your locks Open your garages Brute force your magstripes Open your LF locks from pictures Lock you out/in your building/car/gate with Jamming!

Conclusion Fixes: Better Locks Spread Spectrum for car/gate/etc Encrypted Guard freq / Education on listening MONITOR for Jamming MONITOR magstripe entrances MONITOR entry attempts

Thanks! Roelof Adam (Major Malfunction) + Zac (Apature Labs) Nadeem Douba Rogan, RC1140, Rurapenthe Singe, Todor all of IRC SensePost At1as (Rfcat)