Главная
Study mode:
on
1
Introduction
2
Eavesdropping analog baby monitors
3
Analog baby monitors?
4
Using upconvertors
5
Finding the signal using Spectrum analysis
6
Denodulating the signal
7
What home alarms use RF- remotes?
8
The hardware
9
Replay attacks with GNURadio
10
Amplitude (an) Modulation
11
Using cluster analysis to determine pulse widths
12
Mitigation
13
Interfacing with the microcontroller • Disassembly reveals labelled KPK and test
14
Reading secret passcodes
15
Analysing the rolling code
16
Phase space analysis of the rolling codes
17
Testing codes
18
Bruteforce?
19
Does it work?
20
Conclusion
Description:
Explore the vulnerabilities of common household devices and physical security measures in this Black Hat conference talk. Dive into the world of security breaches affecting popular car models, home alarm systems, and baby monitors. Learn how keyless entry systems can be compromised using predictable rolling codes, software-defined radio, and custom-built robots. Discover the simplicity of eavesdropping on analog baby monitors and the concerning weaknesses in home alarm systems using fixed codes. Examine how a low-cost Arduino and Raspberry Pi-based device can be used to capture and replay codes, effectively disabling alarms. Investigate physical tampering techniques that allow attackers to read secret passcodes from alarm system microcontrollers. Gain insights into these simple yet effective attacks on everyday physical devices and understand mitigation strategies to differentiate between secure and vulnerable products. Follow along with detailed analyses of signal processing, cluster analysis, and phase space analysis techniques used to break device security. Read more

Breaking the Security of Physical Devices

Black Hat
Add to list