Interfacing with the microcontroller • Disassembly reveals labelled KPK and test
14
Reading secret passcodes
15
Analysing the rolling code
16
Phase space analysis of the rolling codes
17
Testing codes
18
Bruteforce?
19
Does it work?
20
Conclusion
Description:
Explore the vulnerabilities of common household devices and physical security measures in this Black Hat conference talk. Dive into the world of security breaches affecting popular car models, home alarm systems, and baby monitors. Learn how keyless entry systems can be compromised using predictable rolling codes, software-defined radio, and custom-built robots. Discover the simplicity of eavesdropping on analog baby monitors and the concerning weaknesses in home alarm systems using fixed codes. Examine how a low-cost Arduino and Raspberry Pi-based device can be used to capture and replay codes, effectively disabling alarms. Investigate physical tampering techniques that allow attackers to read secret passcodes from alarm system microcontrollers. Gain insights into these simple yet effective attacks on everyday physical devices and understand mitigation strategies to differentiate between secure and vulnerable products. Follow along with detailed analyses of signal processing, cluster analysis, and phase space analysis techniques used to break device security.
Read more