SlideShare une entreprise Scribd logo
1  sur  59
Are We Really Safe?
HACKING ACCESS CONTROL SYSTEMS
Dennis Maldonado
 Security Consultant @ KLC Consulting
 Twitter: @DennisMald
 Houston Locksport Co-founder
http://www.meetup.com/Houston-Locksport/
Agenda
 Physical Access Control System
 Linear Commercial Access Control Systems
 Attacks
 Local
 Remote
 Demo/Tools
 Device Enumeration Techniques
 Recommendations
Physical Access Control Systems
Physical Access Control
What do they do?
Limiting access to physical location/resource
 Secure areas using:
 Doors
 Gates
 Elevators floors
 Barrier Arms
 Access control systems
 Keypad Entry (Entry/Directory codes)
 Telephone entry
 Radio receivers for remotes
 Proximity cards (RFID)
 Swipe cards
 Sensors
Physical Access Control
How do they work?
Where are they used?
 Use cases:
 Gated Communities
 Parking Garages
 Office Buildings
 Apartments
 Hotels/Motels
 Commercial Buildings
 Recreational Facilities
 Medical Facilities
Doorking
Chamberlain
Sentex
LiftMaster
Nortek Security & Control/Linear Controllers
Linear Commercial Access Control
Nortek Security & Control/Linear Controllers
AE1000Plus
AE2000Plus
AM3Plus
Linear Controller
 Commercial Telephone Entry
System
 Utilizes a telephone line
 Supports thousands of users
 Networked with other controllers
 Can be configured/controlled
through a PC
 Serial Connection
Linear – TCP/IP Kit
 AM-SEK Kit (Serial-to-TCP)
 Converts Serial to Ethernet
 Allows Management over TCP/IP
network
 Allows for remote management
(over the internet)
Linear – Typical Installation
Serial
Cable
Ethernet
Cable
Management PC
192.168.0.40
AE1000Plus
Controller
Ethernet
Cable
Router/Switch
192.168.0.0/24
Software - AccessBase2000
 Add/remove users
 Entry codes
 Directory codes
 Cards
 Transmitters
 Manually toggle relays
 View log reports
 Communicates through serial
 Requires a password to
authenticate
PC to Controller Communication
 Request
 5AA5000A1105010008000000CB97
 Response
 Acknowledged:5AA50004110C462
5
 Not Acknowledged:
5AA50005110D024C23
 Invalid Checksum:
5AA50005110D017EB8
 No response (not authenticated)
5AA5000A11013635343332319A71
5AA50005110D024C23
5AA5000A11013635343332319A71
Packet
Header
Minimum
Data Length
Maximum
Data Length
Data
(Hex)
Checksum
Net
Node
Command
{
Password = 01
Poll Status = 02
Poll Log = 03
Command = 04
Time = 05
Put Flash = 06
…
}
String is Hex Encoded
Attacks
LOCAL AND REMOTE ATTACKS
So how do we target these
controllers?
 Physical Access
 Local Programming
 Serial port inside the controller
Local Attacks
AE-500 – Default Password
 Hold 0 and 2 on the keypad
 Type the default password:
123456#
 Input the commands to add a
new entry code
 31#9999#9999#99#
 Type in your new code (9999)
 Access Granted!
123456#31#9999#9999#99#
Enter
Programming
Mode
Enter Entry
Code
Confirm
New Entry
Code
Exit
Programming
Mode
New Entry Code
Master Key
 Same key for all AE1000plus,
AM3plus controllers
 Purchase them from a supplier or
on eBay
 Or just pick the lock
 Full access to the device
Physical Access
 Manual Relay Latch buttons
 Toggle Relay
 Lock their state
Physical Access
 Manual Relay Latch buttons
 Toggle Relay
 Lock their state
 Programming buttons
 Program device locally
 Erase Memory
 Active Phone Line
 Serial connection to the controller
Tamper Monitoring?
 Magnetic tamper switch inside
enclosure
 No active alerts
 Can be bypassed by placing a
magnet on the outside of the
enclosure
So how do we target these
controllers?
 Physical Access
 Local Programming
 Serial port inside the controller
So how do we target these
controllers?
 Physical Access
 Local Programming
 Serial port inside the controller
 Internal Network Access
 IP of Serial to TCP device
 TCP Port 4660
 External Network Access
 IP of Serial to TCP device
 TCP Port 4660 open to the internet
5AA5000A11013635343332319A71
5AA50005110D024C23
Bad Guy
5AA5000A11013635343332319A71
5AA50005110D024C23
192.168.0.32:4660
74.12.x.x:4660
Remote Attacks
Demo
Brute-force attack
 No rate limiting
 No password lockout
 Small key space
 Exactly 6 characters
 Numeric only
 Scriptable
Demo
No Password Necessary
 Authentication not enforced!
 Send unauthenticated commands
 Any commands will execute
 May not get any confirmation
data
Hacker
Raw Connection
AE1000Plus
Controller
Open Doors Remotely
 Send one simple command
 5AA5000A1105010000080000E88D
 Triggers a relay for 2 seconds thus
opening a door or gate
 Great for movie style scenes
5AA5000A1105010000080000E88D
Hacker
Raw Connection
AE1000Plus
Controller
Door 1
Access
Granted
Lock Doors Open/Closed
 Keeps Doors/Gates open
or closed
 Will not respond to user
input (RFID cards, remotes,
etc)
 Persist until manually
unlocked or rebooted
Delete Logs From The Controller
 Controller keeps logs of events
 Downloading logs deletes them
from the controller
 Hide evidence of entry or
tampering
Change the Password
 Upload configuration settings
 Change password without
needing the previous password
 Normal functionality remains
 Upload other configuration
changes
Denial of Service
 Fake database update will disable
controller connected to or
rebooted
 Overwrite device firmware
 Lock relays to prevent access
ACAT – Access Control Attack Tool
Demo
Locating Controllers
Device Enumeration Techniques
 Scan the network
 Look for any COM port redirectors
 Default port = TCP 4660
 Send broadcast packet to UDP 55954
 Devices will respond
 Send a password request string to port
4660
 5AA5000A11013635343332319A71
 5AA50004110C4625
 5AA50005110D024C23
5AA5000A11013635343332319A71
5AA50005110D024C23
UDP Broadcast
Broadcast
Response
Client
Response
Demo
Recommendations
 Always change the default password
 Change physical locks
 Use a direct serial connection
 If networked, utilize authentication
 Resist opening the controller to the
internet
Final Thoughts
 Other vendors
 Ongoing research
 Tool – More work is needed
 Tool located on https://github.com/linuz/Access-Control-Attack-Tool
 It’s currently just a prototype
 Continue updating it/take it out of “PoC mode”
 Working on an Nmap script
 Slides uploaded to SlideShare
www.slideshare.net/DennisMaldonado5
Questions?
 If you have any questions, you can:
 Twitter: @DennisMald
 Find me here at DEFCON23
 Email me at: dmaldonado@klcconsulting.net

Contenu connexe

Tendances

Bai giang mon mang may tinh
Bai giang mon mang may tinhBai giang mon mang may tinh
Bai giang mon mang may tinhJun Pham
 
Tim hieu ve lo hong web va cach phong chong
Tim hieu ve lo hong web va cach phong chongTim hieu ve lo hong web va cach phong chong
Tim hieu ve lo hong web va cach phong chongVu Trung Kien
 
Brand Storytelling Using Snapchat
Brand Storytelling Using SnapchatBrand Storytelling Using Snapchat
Brand Storytelling Using SnapchatVicki O'Neill
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0Michael Gough
 
Chương 8_Bảo mật và an ninh mạng
Chương 8_Bảo mật và an ninh mạngChương 8_Bảo mật và an ninh mạng
Chương 8_Bảo mật và an ninh mạngHoa Le
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxDARSHANBHAVSAR14
 
Xây dựng hệ thống mạng cho Công Ty Cổ Phần Trường Tân trên nền tảng server 2008
Xây dựng hệ thống mạng cho Công Ty Cổ Phần Trường Tân trên nền tảng server 2008Xây dựng hệ thống mạng cho Công Ty Cổ Phần Trường Tân trên nền tảng server 2008
Xây dựng hệ thống mạng cho Công Ty Cổ Phần Trường Tân trên nền tảng server 2008laonap166
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
Laravel
LaravelLaravel
LaravelHoc Vu
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Sudhanshu Chauhan
 
Báo cáo thực tập chuyên đề Wordpress
Báo cáo thực tập chuyên đề WordpressBáo cáo thực tập chuyên đề Wordpress
Báo cáo thực tập chuyên đề Wordpressvngnhuhaiyen236
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationOlehLevytskyi1
 
Báo cáo thực tập chuyên đề wordpress
Báo cáo thực tập chuyên đề wordpressBáo cáo thực tập chuyên đề wordpress
Báo cáo thực tập chuyên đề wordpressvngnhuhaiyen236
 
Tài liệu nhập môn mạng máy tính (Tiếng Việt)
Tài liệu nhập môn mạng máy tính (Tiếng Việt)Tài liệu nhập môn mạng máy tính (Tiếng Việt)
Tài liệu nhập môn mạng máy tính (Tiếng Việt)KinhDinhBach
 
Đồ án thực tập cơ sở các kĩ thuật tấn công SQL injection và cách phòng chống
Đồ án thực tập cơ sở các kĩ thuật tấn công SQL injection và cách phòng chốngĐồ án thực tập cơ sở các kĩ thuật tấn công SQL injection và cách phòng chống
Đồ án thực tập cơ sở các kĩ thuật tấn công SQL injection và cách phòng chốngnataliej4
 
Cau hoi iq_va_dap_an_kem_theo_viettel
Cau hoi iq_va_dap_an_kem_theo_viettelCau hoi iq_va_dap_an_kem_theo_viettel
Cau hoi iq_va_dap_an_kem_theo_viettelnguyen Thien
 
Tim hieu lo hong web va cach phong chong
Tim hieu lo hong web va cach phong chongTim hieu lo hong web va cach phong chong
Tim hieu lo hong web va cach phong chongVu Trung Kien
 

Tendances (20)

SQL injection
SQL injectionSQL injection
SQL injection
 
Bai giang mon mang may tinh
Bai giang mon mang may tinhBai giang mon mang may tinh
Bai giang mon mang may tinh
 
Tim hieu ve lo hong web va cach phong chong
Tim hieu ve lo hong web va cach phong chongTim hieu ve lo hong web va cach phong chong
Tim hieu ve lo hong web va cach phong chong
 
Brand Storytelling Using Snapchat
Brand Storytelling Using SnapchatBrand Storytelling Using Snapchat
Brand Storytelling Using Snapchat
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0
 
Chương 8_Bảo mật và an ninh mạng
Chương 8_Bảo mật và an ninh mạngChương 8_Bảo mật và an ninh mạng
Chương 8_Bảo mật và an ninh mạng
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
Xây dựng hệ thống mạng cho Công Ty Cổ Phần Trường Tân trên nền tảng server 2008
Xây dựng hệ thống mạng cho Công Ty Cổ Phần Trường Tân trên nền tảng server 2008Xây dựng hệ thống mạng cho Công Ty Cổ Phần Trường Tân trên nền tảng server 2008
Xây dựng hệ thống mạng cho Công Ty Cổ Phần Trường Tân trên nền tảng server 2008
 
Phishing
PhishingPhishing
Phishing
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
Laravel
LaravelLaravel
Laravel
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Báo cáo thực tập chuyên đề Wordpress
Báo cáo thực tập chuyên đề WordpressBáo cáo thực tập chuyên đề Wordpress
Báo cáo thực tập chuyên đề Wordpress
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
Báo cáo thực tập chuyên đề wordpress
Báo cáo thực tập chuyên đề wordpressBáo cáo thực tập chuyên đề wordpress
Báo cáo thực tập chuyên đề wordpress
 
Tìm hiểu và triển khai hệ thống tường lửa OPNSense cho doanh nghiệp.docx
Tìm hiểu và triển khai hệ thống tường lửa OPNSense cho doanh nghiệp.docxTìm hiểu và triển khai hệ thống tường lửa OPNSense cho doanh nghiệp.docx
Tìm hiểu và triển khai hệ thống tường lửa OPNSense cho doanh nghiệp.docx
 
Tài liệu nhập môn mạng máy tính (Tiếng Việt)
Tài liệu nhập môn mạng máy tính (Tiếng Việt)Tài liệu nhập môn mạng máy tính (Tiếng Việt)
Tài liệu nhập môn mạng máy tính (Tiếng Việt)
 
Đồ án thực tập cơ sở các kĩ thuật tấn công SQL injection và cách phòng chống
Đồ án thực tập cơ sở các kĩ thuật tấn công SQL injection và cách phòng chốngĐồ án thực tập cơ sở các kĩ thuật tấn công SQL injection và cách phòng chống
Đồ án thực tập cơ sở các kĩ thuật tấn công SQL injection và cách phòng chống
 
Cau hoi iq_va_dap_an_kem_theo_viettel
Cau hoi iq_va_dap_an_kem_theo_viettelCau hoi iq_va_dap_an_kem_theo_viettel
Cau hoi iq_va_dap_an_kem_theo_viettel
 
Tim hieu lo hong web va cach phong chong
Tim hieu lo hong web va cach phong chongTim hieu lo hong web va cach phong chong
Tim hieu lo hong web va cach phong chong
 

Similaire à Hacking Access Control Systems

Turnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CatalogueTurnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CataloguePERCo
 
HWg-Juno 404 - Datasheet
HWg-Juno 404 - DatasheetHWg-Juno 404 - Datasheet
HWg-Juno 404 - DatasheetSiemens
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securitypptSachin Roy
 
protegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- systemprotegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- systemNikolaSecuriton
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Technology
 
Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008jeremyomeara
 
Bosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data SheetBosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data SheetJMAC Supply
 
In bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systemsIn bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systemsMayank Jain
 
MOX IRIS Video Door Phone
MOX IRIS Video Door PhoneMOX IRIS Video Door Phone
MOX IRIS Video Door Phonemoxreview
 
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET Journal
 
Cyber Defense - Annunciators as watcher for critical process applications
Cyber Defense - Annunciators as watcher for critical process applicationsCyber Defense - Annunciators as watcher for critical process applications
Cyber Defense - Annunciators as watcher for critical process applicationsM.S. Jacobs & Associates
 
Application of alarm annunciator as cyber security layer
Application of alarm annunciator as cyber security layerApplication of alarm annunciator as cyber security layer
Application of alarm annunciator as cyber security layerBelilove Company-Engineers
 
Improve Process Control Security Using Annunciators as Watchers
Improve Process Control Security Using Annunciators as WatchersImprove Process Control Security Using Annunciators as Watchers
Improve Process Control Security Using Annunciators as WatchersFlow-Tech, Inc.
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric PresentationDarrell Smith
 

Similaire à Hacking Access Control Systems (20)

Turnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CatalogueTurnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo Catalogue
 
HWg-Juno 404 - Datasheet
HWg-Juno 404 - DatasheetHWg-Juno 404 - Datasheet
HWg-Juno 404 - Datasheet
 
Ad830 user manual
Ad830 user manualAd830 user manual
Ad830 user manual
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
 
protegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- systemprotegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- system
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARD
 
Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008
 
Bosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data SheetBosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data Sheet
 
Homeautomation
HomeautomationHomeautomation
Homeautomation
 
Homeautomation
HomeautomationHomeautomation
Homeautomation
 
In bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systemsIn bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systems
 
MOX IRIS Video Door Phone
MOX IRIS Video Door PhoneMOX IRIS Video Door Phone
MOX IRIS Video Door Phone
 
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
 
Automatic Dialing Alert System / Remote Indication System
Automatic Dialing Alert System / Remote Indication SystemAutomatic Dialing Alert System / Remote Indication System
Automatic Dialing Alert System / Remote Indication System
 
Hotel locks-e790-brochure
Hotel locks-e790-brochureHotel locks-e790-brochure
Hotel locks-e790-brochure
 
Hasco english
Hasco englishHasco english
Hasco english
 
Cyber Defense - Annunciators as watcher for critical process applications
Cyber Defense - Annunciators as watcher for critical process applicationsCyber Defense - Annunciators as watcher for critical process applications
Cyber Defense - Annunciators as watcher for critical process applications
 
Application of alarm annunciator as cyber security layer
Application of alarm annunciator as cyber security layerApplication of alarm annunciator as cyber security layer
Application of alarm annunciator as cyber security layer
 
Improve Process Control Security Using Annunciators as Watchers
Improve Process Control Security Using Annunciators as WatchersImprove Process Control Security Using Annunciators as Watchers
Improve Process Control Security Using Annunciators as Watchers
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Hacking Access Control Systems

  • 1. Are We Really Safe? HACKING ACCESS CONTROL SYSTEMS
  • 2. Dennis Maldonado  Security Consultant @ KLC Consulting  Twitter: @DennisMald  Houston Locksport Co-founder http://www.meetup.com/Houston-Locksport/
  • 3. Agenda  Physical Access Control System  Linear Commercial Access Control Systems  Attacks  Local  Remote  Demo/Tools  Device Enumeration Techniques  Recommendations
  • 5. Physical Access Control What do they do? Limiting access to physical location/resource  Secure areas using:  Doors  Gates  Elevators floors  Barrier Arms
  • 6.  Access control systems  Keypad Entry (Entry/Directory codes)  Telephone entry  Radio receivers for remotes  Proximity cards (RFID)  Swipe cards  Sensors Physical Access Control How do they work?
  • 7. Where are they used?  Use cases:  Gated Communities  Parking Garages  Office Buildings  Apartments  Hotels/Motels  Commercial Buildings  Recreational Facilities  Medical Facilities
  • 12. Nortek Security & Control/Linear Controllers
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20. Nortek Security & Control/Linear Controllers AE1000Plus AE2000Plus AM3Plus
  • 21. Linear Controller  Commercial Telephone Entry System  Utilizes a telephone line  Supports thousands of users  Networked with other controllers  Can be configured/controlled through a PC  Serial Connection
  • 22. Linear – TCP/IP Kit  AM-SEK Kit (Serial-to-TCP)  Converts Serial to Ethernet  Allows Management over TCP/IP network  Allows for remote management (over the internet)
  • 23. Linear – Typical Installation Serial Cable Ethernet Cable Management PC 192.168.0.40 AE1000Plus Controller Ethernet Cable Router/Switch 192.168.0.0/24
  • 24.
  • 25. Software - AccessBase2000  Add/remove users  Entry codes  Directory codes  Cards  Transmitters  Manually toggle relays  View log reports  Communicates through serial  Requires a password to authenticate
  • 26.
  • 27.
  • 28. PC to Controller Communication  Request  5AA5000A1105010008000000CB97  Response  Acknowledged:5AA50004110C462 5  Not Acknowledged: 5AA50005110D024C23  Invalid Checksum: 5AA50005110D017EB8  No response (not authenticated) 5AA5000A11013635343332319A71 5AA50005110D024C23
  • 29. 5AA5000A11013635343332319A71 Packet Header Minimum Data Length Maximum Data Length Data (Hex) Checksum Net Node Command { Password = 01 Poll Status = 02 Poll Log = 03 Command = 04 Time = 05 Put Flash = 06 … } String is Hex Encoded
  • 31. So how do we target these controllers?  Physical Access  Local Programming  Serial port inside the controller
  • 33. AE-500 – Default Password  Hold 0 and 2 on the keypad  Type the default password: 123456#  Input the commands to add a new entry code  31#9999#9999#99#  Type in your new code (9999)  Access Granted!
  • 35.
  • 36. Master Key  Same key for all AE1000plus, AM3plus controllers  Purchase them from a supplier or on eBay  Or just pick the lock  Full access to the device
  • 37. Physical Access  Manual Relay Latch buttons  Toggle Relay  Lock their state
  • 38. Physical Access  Manual Relay Latch buttons  Toggle Relay  Lock their state  Programming buttons  Program device locally  Erase Memory  Active Phone Line  Serial connection to the controller
  • 39. Tamper Monitoring?  Magnetic tamper switch inside enclosure  No active alerts  Can be bypassed by placing a magnet on the outside of the enclosure
  • 40.
  • 41. So how do we target these controllers?  Physical Access  Local Programming  Serial port inside the controller
  • 42. So how do we target these controllers?  Physical Access  Local Programming  Serial port inside the controller  Internal Network Access  IP of Serial to TCP device  TCP Port 4660  External Network Access  IP of Serial to TCP device  TCP Port 4660 open to the internet 5AA5000A11013635343332319A71 5AA50005110D024C23 Bad Guy 5AA5000A11013635343332319A71 5AA50005110D024C23 192.168.0.32:4660 74.12.x.x:4660
  • 44. Demo
  • 45. Brute-force attack  No rate limiting  No password lockout  Small key space  Exactly 6 characters  Numeric only  Scriptable
  • 46. Demo
  • 47. No Password Necessary  Authentication not enforced!  Send unauthenticated commands  Any commands will execute  May not get any confirmation data Hacker Raw Connection AE1000Plus Controller
  • 48. Open Doors Remotely  Send one simple command  5AA5000A1105010000080000E88D  Triggers a relay for 2 seconds thus opening a door or gate  Great for movie style scenes 5AA5000A1105010000080000E88D Hacker Raw Connection AE1000Plus Controller Door 1 Access Granted
  • 49. Lock Doors Open/Closed  Keeps Doors/Gates open or closed  Will not respond to user input (RFID cards, remotes, etc)  Persist until manually unlocked or rebooted
  • 50. Delete Logs From The Controller  Controller keeps logs of events  Downloading logs deletes them from the controller  Hide evidence of entry or tampering
  • 51. Change the Password  Upload configuration settings  Change password without needing the previous password  Normal functionality remains  Upload other configuration changes
  • 52. Denial of Service  Fake database update will disable controller connected to or rebooted  Overwrite device firmware  Lock relays to prevent access
  • 53. ACAT – Access Control Attack Tool Demo
  • 55. Device Enumeration Techniques  Scan the network  Look for any COM port redirectors  Default port = TCP 4660  Send broadcast packet to UDP 55954  Devices will respond  Send a password request string to port 4660  5AA5000A11013635343332319A71  5AA50004110C4625  5AA50005110D024C23 5AA5000A11013635343332319A71 5AA50005110D024C23 UDP Broadcast Broadcast Response Client Response
  • 56. Demo
  • 57. Recommendations  Always change the default password  Change physical locks  Use a direct serial connection  If networked, utilize authentication  Resist opening the controller to the internet
  • 58. Final Thoughts  Other vendors  Ongoing research  Tool – More work is needed  Tool located on https://github.com/linuz/Access-Control-Attack-Tool  It’s currently just a prototype  Continue updating it/take it out of “PoC mode”  Working on an Nmap script  Slides uploaded to SlideShare www.slideshare.net/DennisMaldonado5
  • 59. Questions?  If you have any questions, you can:  Twitter: @DennisMald  Find me here at DEFCON23  Email me at: dmaldonado@klcconsulting.net

Notes de l'éditeur

  1. Thank everyone for the opportunity to speak!
  2. Passion for Physical security and combining with with electronic aspects
  3. Physical Access Control System What they are Use cases Vendors Talk about a specific vendor of access control, the architecture, and how it communicates Attacks, local and remote Demo and tools Device enumeration Recommendations TALK ABOUT DEMO
  4. Control a variety of devices
  5. Selectively permit access to a protected resource or area. Authenticate users in a variety of ways. Some solutions utilize only some of these methods SHOW EXAMPLE: Use transmitters to open Doors 2-4
  6. Talk about the use cases I have seen while going through pictures on the next few slides Not limited to
  7. DKS (Doorking) Model 1834, 1835, 1837
  8. Elite EL2000, Elite Icon 26
  9. Owned by Chamberlain – Sentex Infinity S, Infinity M, Infinity L
  10. Owned by Chamberlain - EL1SS, EL2000
  11. Linear AE1000, AE1000plus, AE2000plus, AM3plus controllers Finally talk about what we will be focusing on Linear 1000plus, 2000plus, AM3plus are all the same 2000plus offers a bigger screen and more buttons AM3plus headless, no interface for users. Used for certain access situations (RFID only for example) or expansion of an existing system
  12. Condominiums downtown (note the use of a keypad and RFID reader)
  13. Gated communities
  14. Commercial buildings
  15. Elevator access on the left On the right, room with locked controllers for access control, networked together
  16. Access control controller (AM3plus) found in a bathroom. HERE IS ANOTHER ONE I FOUND
  17. Access control controller (AM3plus) found in a bathroom.
  18. Linear AE1000, AE1000plus, AE2000plus, AM3plus controllers Finally talk about what we will be focusing on Linear 1000plus, 2000plus, AM3plus are all the same 2000plus offers a bigger screen and more buttons AM3plus headless, no interface for users. Used for certain access situations (RFID only for example) or expansion of an existing system
  19. Smarter access control system
  20. Controllers are the ae1000,2000,am3plus Active phone line used for calling users or potentially managing the device in certain configurations AM-SEK used to allow these devices to be managed on a conventional TCP/IP network or potentially remotely over the internet. The managing computer will create a virtual serial port which will then connect to this serial-to-tcp device The most common use case I have seen in the field Network scan
  21. Controllers are the ae1000,2000,am3plus Active phone line used for calling users or potentially managing the device in certain configurations AM-SEK used to allow these devices to be managed on a conventional TCP/IP network or potentially remotely over the internet. The managing computer will create a virtual serial port which will then connect to this serial-to-tcp device The most common use case I have seen in the field Network scan
  22. Controller is connected to the serial-to-tcp interface which is then connected to the network. From there a computer on the local network can manage the controller using special software to interface with it. Documentation encourages external internet access by forwarding ports to the serial-to-tcp/ip interface. No authentication required -- So now that we understand how [this] is set up, lets talk about how a computer interfaces with the Linear Controller
  23. Software used to connect to the controller Requires a password to authenticate. Talk about how to download
  24. Putting in the password. Password is exactly 6 characters, numeric only. Application attempts the password when connecting Application will not do anything unless the correct password is put in
  25. Example of managing users
  26. PacketHeader is fixed, hard-coded Mimimum length of the data that will be sent Maximum length of the data Net Node which is the address of the controller relative to the other controllers on the network Command (1-16) such as pull log, push firmware, query status, etc Data itself. The data is the ASCII encoded values of each character which is then converted to hex and sent over the virtual serial connection Check sum which is used to check the validity of the message. Calculated from the NetNode, command, and data values.
  27. Find devices by scanning the network (nmap)
  28. So now that we talked about the remote attacks, lets assume that these devices are not networked or are the versions that do not support networking.
  29. AE-500 does not support networked configuration and is programmed locally from the keypad. The AE-5000 is used for much smaller installations Default password, rarely ever changed from what I have seen in the field Use key combination with the default password to backdoor the controller in under 10 seconds
  30. PacketHeader is fixed, hard-coded Mimimum length of the data that will be sent Maximum length of the data Net Node which is the address of the controller relative to the other controllers on the network Command (1-16) such as pull log, push firmware, query status, etc Data itself. The data is the ASCII encoded values of each character which is then converted to hex and sent over the virtual serial connection Check sum which is used to check the validity of the message. Calculated from the NetNode, command, and data values.
  31. Video of utilizing the default password on the keypad to create my own entry code Commentate video while playing
  32. At least all AE1000plus and AM3plus share the same key regardless of supplier Obtain the key from the vendor, a supplier, or purchase them off eBay (enclosures) You could also pick the lock if you are so inclined Physical access to the inside of the controller will give you full access
  33. Toggle relays to open doors or gates
  34. Manually re-program some controllers or completely reset the controllers Active phone line, find the phone number and use it to call the device. You may be able to program the device from the phone if you know the master password (default=123456) Serial connection to the controller for attacks (raspberry pi to make it networked/backdoored)
  35. Tamper switch used for monitoring when the enclosure is opened or closed No active alerts, need to download the logs and view the logs for any tamper events Can be rendered useless by placing a magnet at the right place
  36. Video of bypassing magnetic tamper switch Commentate video while playing
  37. So now that we talked about physical access, lets talk about targeting these devices via the network or internet
  38. Find devices by scanning the network (nmap)
  39. Lets get into the fun stuff
  40. Show the accessbase software and trying to log into it resulting in “Wrong Password” (Client password should be set to 123456 while controller should be set to 000051 or something else)
  41. A password is “required” to configure the device. There is no rate limit or password lockout so you can just keep sending guesses in a typical bruteforce fashion. The speed is limited by the speed of the virtual serial connection Exactly 1,000,000 combinations to test Testing full keyspace would take about 114 hours which is about 4.75 days
  42. Demo the brute force script. Finish talking BEFORE the attack is finished! Show the access base software, logging into it and triggering relays Demo downloading logs normally after bruteforcing password
  43. Authentication is “required” but not enforced You can send serial commands through the virtual serial connection which will be executed by the controller Does not require a password or prior authentication Most commands will not return any data if the user has not authenticated recently, however, they will still execute. What can we do wit this?
  44. Trigger the controller’s relays! Send one command and the specific relay will trigger for x number of seconds depending on configuration (2 by default) Just like if someone was granted access normally using an entry code or RFID card for example Logged as request to exit so it would be hard to detect this was done illegitimately after the fact Scenario: Classic movie scenario where you have a team of jewelry thieves who enter the building after the hacker on the team who is setting in a van across the street hacks into the access control network with his or her laptop and grants them access into the building
  45. Lock relay state to either open or closed Effectively locks doors, gates, or whatever to open or closed state, making them unresponsive to valid user. Keep a door open or keep it closed Persists until manually unlocked or the controller is rebooted
  46. The controller logs most things including access denied, access granted, controller enclosure is opened (tamper switch) device rebooted, and more Every time the logs are downloaded from the controller into the application, the logs are deleted from the controller to save space. Initiate a log download, and the logs are deleted from the controller! Hides any evidence of entry or tampering with the controller
  47. Upload configuration without authentication which can be used to change the password without needing the previous password Controller continues to function normally Can upload other changes such as entry codes or transmitters (backdoor)
  48. Prevent people from using the controller Lock relays to prevent access to doors or gates Fake a database update which will effectively disable the controller until someone else authenticates to it or the device is rebooted Overwrite the devices firmware to brick the device
  49. Show entire tool in windows, including deleting logs
  50. UDP broadcast is animated
  51. Demo of DetectLinear tool
  52. Always change the default password Do not network these if you don’t have to (direct serial connection) If you have to network this, utilize authentication everywhere (including the serial-to-tcp device) Don’t open this to the internet Change the lock to something more secure
  53. Still working on my research. I do hope to cover more on this and other vendors as well. These issues are not limited to any one vendor Need to finish the tool (make some fixes/updates) Working on more security research on that focuses to joining the physical and electronic space.
  54. Q/A session