YoVDO

Breaking the Security of Physical Devices

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Mathematics Courses Data Analysis Courses Cybersecurity Courses Robotics Courses Cluster Analysis Courses Software-Defined Radio Courses Replay Attacks Courses

Course Description

Overview

Explore the vulnerabilities of common household devices and physical security measures in this Black Hat conference talk. Dive into the world of security breaches affecting popular car models, home alarm systems, and baby monitors. Learn how keyless entry systems can be compromised using predictable rolling codes, software-defined radio, and custom-built robots. Discover the simplicity of eavesdropping on analog baby monitors and the concerning weaknesses in home alarm systems using fixed codes. Examine how a low-cost Arduino and Raspberry Pi-based device can be used to capture and replay codes, effectively disabling alarms. Investigate physical tampering techniques that allow attackers to read secret passcodes from alarm system microcontrollers. Gain insights into these simple yet effective attacks on everyday physical devices and understand mitigation strategies to differentiate between secure and vulnerable products. Follow along with detailed analyses of signal processing, cluster analysis, and phase space analysis techniques used to break device security.

Syllabus

Introduction
Eavesdropping analog baby monitors
Analog baby monitors?
Using upconvertors
Finding the signal using Spectrum analysis
Denodulating the signal
What home alarms use RF- remotes?
The hardware
Replay attacks with GNURadio
Amplitude (an) Modulation
Using cluster analysis to determine pulse widths
Mitigation
Interfacing with the microcontroller • Disassembly reveals labelled KPK and test
Reading secret passcodes
Analysing the rolling code
Phase space analysis of the rolling codes
Testing codes
Bruteforce?
Does it work?
Conclusion


Taught by

Black Hat

Related Courses

Hacking RF - Breaking What We Can't See
Security BSides London via YouTube
Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube
Car Hacking - Practical Guide to Automotive Security
Hack In The Box Security Conference via YouTube
Red Teaming a Manufacturing Network - Without Crashing It
BSidesLV via YouTube
Breaking Fraud and Bot Detection Solutions
OWASP Foundation via YouTube