SlideShare ist ein Scribd-Unternehmen logo
1 von 59
Are We Really Safe?
HACKING ACCESS CONTROL SYSTEMS
Dennis Maldonado
 Security Consultant @ KLC Consulting
 Twitter: @DennisMald
 Houston Locksport Co-founder
http://www.meetup.com/Houston-Locksport/
Agenda
 Physical Access Control System
 Linear Commercial Access Control Systems
 Attacks
 Local
 Remote
 Demo/Tools
 Device Enumeration Techniques
 Recommendations
Physical Access Control Systems
Physical Access Control
What do they do?
Limiting access to physical location/resource
 Secure areas using:
 Doors
 Gates
 Elevators floors
 Barrier Arms
 Access control systems
 Keypad Entry (Entry/Directory codes)
 Telephone entry
 Radio receivers for remotes
 Proximity cards (RFID)
 Swipe cards
 Sensors
Physical Access Control
How do they work?
Where are they used?
 Use cases:
 Gated Communities
 Parking Garages
 Office Buildings
 Apartments
 Hotels/Motels
 Commercial Buildings
 Recreational Facilities
 Medical Facilities
Doorking
Chamberlain
Sentex
LiftMaster
Nortek Security & Control/Linear Controllers
Linear Commercial Access Control
Nortek Security & Control/Linear Controllers
AE1000Plus
AE2000Plus
AM3Plus
Linear Controller
 Commercial Telephone Entry
System
 Utilizes a telephone line
 Supports thousands of users
 Networked with other controllers
 Can be configured/controlled
through a PC
 Serial Connection
Linear – TCP/IP Kit
 AM-SEK Kit (Serial-to-TCP)
 Converts Serial to Ethernet
 Allows Management over TCP/IP
network
 Allows for remote management
(over the internet)
Linear – Typical Installation
Serial
Cable
Ethernet
Cable
Management PC
192.168.0.40
AE1000Plus
Controller
Ethernet
Cable
Router/Switch
192.168.0.0/24
Software - AccessBase2000
 Add/remove users
 Entry codes
 Directory codes
 Cards
 Transmitters
 Manually toggle relays
 View log reports
 Communicates through serial
 Requires a password to
authenticate
PC to Controller Communication
 Request
 5AA5000A1105010008000000CB97
 Response
 Acknowledged:5AA50004110C462
5
 Not Acknowledged:
5AA50005110D024C23
 Invalid Checksum:
5AA50005110D017EB8
 No response (not authenticated)
5AA5000A11013635343332319A71
5AA50005110D024C23
5AA5000A11013635343332319A71
Packet
Header
Minimum
Data Length
Maximum
Data Length
Data
(Hex)
Checksum
Net
Node
Command
{
Password = 01
Poll Status = 02
Poll Log = 03
Command = 04
Time = 05
Put Flash = 06
…
}
String is Hex Encoded
Attacks
LOCAL AND REMOTE ATTACKS
So how do we target these
controllers?
 Physical Access
 Local Programming
 Serial port inside the controller
Local Attacks
AE-500 – Default Password
 Hold 0 and 2 on the keypad
 Type the default password:
123456#
 Input the commands to add a
new entry code
 31#9999#9999#99#
 Type in your new code (9999)
 Access Granted!
123456#31#9999#9999#99#
Enter
Programming
Mode
Enter Entry
Code
Confirm
New Entry
Code
Exit
Programming
Mode
New Entry Code
Master Key
 Same key for all AE1000plus,
AM3plus controllers
 Purchase them from a supplier or
on eBay
 Or just pick the lock
 Full access to the device
Physical Access
 Manual Relay Latch buttons
 Toggle Relay
 Lock their state
Physical Access
 Manual Relay Latch buttons
 Toggle Relay
 Lock their state
 Programming buttons
 Program device locally
 Erase Memory
 Active Phone Line
 Serial connection to the controller
Tamper Monitoring?
 Magnetic tamper switch inside
enclosure
 No active alerts
 Can be bypassed by placing a
magnet on the outside of the
enclosure
So how do we target these
controllers?
 Physical Access
 Local Programming
 Serial port inside the controller
So how do we target these
controllers?
 Physical Access
 Local Programming
 Serial port inside the controller
 Internal Network Access
 IP of Serial to TCP device
 TCP Port 4660
 External Network Access
 IP of Serial to TCP device
 TCP Port 4660 open to the internet
5AA5000A11013635343332319A71
5AA50005110D024C23
Bad Guy
5AA5000A11013635343332319A71
5AA50005110D024C23
192.168.0.32:4660
74.12.x.x:4660
Remote Attacks
Demo
Brute-force attack
 No rate limiting
 No password lockout
 Small key space
 Exactly 6 characters
 Numeric only
 Scriptable
Demo
No Password Necessary
 Authentication not enforced!
 Send unauthenticated commands
 Any commands will execute
 May not get any confirmation
data
Hacker
Raw Connection
AE1000Plus
Controller
Open Doors Remotely
 Send one simple command
 5AA5000A1105010000080000E88D
 Triggers a relay for 2 seconds thus
opening a door or gate
 Great for movie style scenes
5AA5000A1105010000080000E88D
Hacker
Raw Connection
AE1000Plus
Controller
Door 1
Access
Granted
Lock Doors Open/Closed
 Keeps Doors/Gates open
or closed
 Will not respond to user
input (RFID cards, remotes,
etc)
 Persist until manually
unlocked or rebooted
Delete Logs From The Controller
 Controller keeps logs of events
 Downloading logs deletes them
from the controller
 Hide evidence of entry or
tampering
Change the Password
 Upload configuration settings
 Change password without
needing the previous password
 Normal functionality remains
 Upload other configuration
changes
Denial of Service
 Fake database update will disable
controller connected to or
rebooted
 Overwrite device firmware
 Lock relays to prevent access
ACAT – Access Control Attack Tool
Demo
Locating Controllers
Device Enumeration Techniques
 Scan the network
 Look for any COM port redirectors
 Default port = TCP 4660
 Send broadcast packet to UDP 55954
 Devices will respond
 Send a password request string to port
4660
 5AA5000A11013635343332319A71
 5AA50004110C4625
 5AA50005110D024C23
5AA5000A11013635343332319A71
5AA50005110D024C23
UDP Broadcast
Broadcast
Response
Client
Response
Demo
Recommendations
 Always change the default password
 Change physical locks
 Use a direct serial connection
 If networked, utilize authentication
 Resist opening the controller to the
internet
Final Thoughts
 Other vendors
 Ongoing research
 Tool – More work is needed
 Tool located on https://github.com/linuz/Access-Control-Attack-Tool
 It’s currently just a prototype
 Continue updating it/take it out of “PoC mode”
 Working on an Nmap script
 Slides uploaded to SlideShare
www.slideshare.net/DennisMaldonado5
Questions?
 If you have any questions, you can:
 Twitter: @DennisMald
 Find me here at DEFCON23
 Email me at: dmaldonado@klcconsulting.net

Weitere ähnliche Inhalte

Was ist angesagt?

KPUCC-Rs instructor ppt_chapter5_final
KPUCC-Rs instructor ppt_chapter5_finalKPUCC-Rs instructor ppt_chapter5_final
KPUCC-Rs instructor ppt_chapter5_final
Fisal Anwari
 
Router and Routing Protocol Attacks
Router and Routing Protocol AttacksRouter and Routing Protocol Attacks
Router and Routing Protocol Attacks
Conferencias FIST
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
Irsandi Hasan
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
anusachu .
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
Ross Wolf
 

Was ist angesagt? (20)

MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
 
Column Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL ServerColumn Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL Server
 
The WAF book (Web App Firewall )
The WAF book  (Web App Firewall )The WAF book  (Web App Firewall )
The WAF book (Web App Firewall )
 
Cloud Summit Canada com Rodrigo Montoro
Cloud Summit Canada com Rodrigo MontoroCloud Summit Canada com Rodrigo Montoro
Cloud Summit Canada com Rodrigo Montoro
 
KPUCC-Rs instructor ppt_chapter5_final
KPUCC-Rs instructor ppt_chapter5_finalKPUCC-Rs instructor ppt_chapter5_final
KPUCC-Rs instructor ppt_chapter5_final
 
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
 
Router and Routing Protocol Attacks
Router and Routing Protocol AttacksRouter and Routing Protocol Attacks
Router and Routing Protocol Attacks
 
35 comandos juniper
35 comandos juniper35 comandos juniper
35 comandos juniper
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
 
I Know Your P4$$w0rd (And If I Don't, I Will Guess It...)
I Know Your P4$$w0rd (And If I Don't, I Will Guess It...)I Know Your P4$$w0rd (And If I Don't, I Will Guess It...)
I Know Your P4$$w0rd (And If I Don't, I Will Guess It...)
 
Defending Your "Gold"
Defending Your "Gold"Defending Your "Gold"
Defending Your "Gold"
 
Dvwa low level
Dvwa low levelDvwa low level
Dvwa low level
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
Quality of-service configuration on cisco nexus
Quality of-service configuration on cisco nexusQuality of-service configuration on cisco nexus
Quality of-service configuration on cisco nexus
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
Huawei switch configuration commands
Huawei switch configuration commandsHuawei switch configuration commands
Huawei switch configuration commands
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
 
OWASP SD: Deserialize My Shorts: Or How I Learned To Start Worrying and Hate ...
OWASP SD: Deserialize My Shorts: Or How I Learned To Start Worrying and Hate ...OWASP SD: Deserialize My Shorts: Or How I Learned To Start Worrying and Hate ...
OWASP SD: Deserialize My Shorts: Or How I Learned To Start Worrying and Hate ...
 

Ähnlich wie Hacking Access Control Systems

Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008
jeremyomeara
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
Darrell Smith
 

Ähnlich wie Hacking Access Control Systems (20)

Turnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CatalogueTurnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo Catalogue
 
HWg-Juno 404 - Datasheet
HWg-Juno 404 - DatasheetHWg-Juno 404 - Datasheet
HWg-Juno 404 - Datasheet
 
Ad830 user manual
Ad830 user manualAd830 user manual
Ad830 user manual
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
 
protegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- systemprotegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- system
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARD
 
Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008
 
Bosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data SheetBosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data Sheet
 
Homeautomation
HomeautomationHomeautomation
Homeautomation
 
Homeautomation
HomeautomationHomeautomation
Homeautomation
 
In bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systemsIn bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systems
 
MOX IRIS Video Door Phone
MOX IRIS Video Door PhoneMOX IRIS Video Door Phone
MOX IRIS Video Door Phone
 
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
 
Automatic Dialing Alert System / Remote Indication System
Automatic Dialing Alert System / Remote Indication SystemAutomatic Dialing Alert System / Remote Indication System
Automatic Dialing Alert System / Remote Indication System
 
Hotel locks-e790-brochure
Hotel locks-e790-brochureHotel locks-e790-brochure
Hotel locks-e790-brochure
 
Hasco english
Hasco englishHasco english
Hasco english
 
Application of alarm annunciator as cyber security layer
Application of alarm annunciator as cyber security layerApplication of alarm annunciator as cyber security layer
Application of alarm annunciator as cyber security layer
 
Improve Process Control Security Using Annunciators as Watchers
Improve Process Control Security Using Annunciators as WatchersImprove Process Control Security Using Annunciators as Watchers
Improve Process Control Security Using Annunciators as Watchers
 
Cyber Defense - Annunciators as watcher for critical process applications
Cyber Defense - Annunciators as watcher for critical process applicationsCyber Defense - Annunciators as watcher for critical process applications
Cyber Defense - Annunciators as watcher for critical process applications
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Hacking Access Control Systems

  • 1. Are We Really Safe? HACKING ACCESS CONTROL SYSTEMS
  • 2. Dennis Maldonado  Security Consultant @ KLC Consulting  Twitter: @DennisMald  Houston Locksport Co-founder http://www.meetup.com/Houston-Locksport/
  • 3. Agenda  Physical Access Control System  Linear Commercial Access Control Systems  Attacks  Local  Remote  Demo/Tools  Device Enumeration Techniques  Recommendations
  • 5. Physical Access Control What do they do? Limiting access to physical location/resource  Secure areas using:  Doors  Gates  Elevators floors  Barrier Arms
  • 6.  Access control systems  Keypad Entry (Entry/Directory codes)  Telephone entry  Radio receivers for remotes  Proximity cards (RFID)  Swipe cards  Sensors Physical Access Control How do they work?
  • 7. Where are they used?  Use cases:  Gated Communities  Parking Garages  Office Buildings  Apartments  Hotels/Motels  Commercial Buildings  Recreational Facilities  Medical Facilities
  • 12. Nortek Security & Control/Linear Controllers
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20. Nortek Security & Control/Linear Controllers AE1000Plus AE2000Plus AM3Plus
  • 21. Linear Controller  Commercial Telephone Entry System  Utilizes a telephone line  Supports thousands of users  Networked with other controllers  Can be configured/controlled through a PC  Serial Connection
  • 22. Linear – TCP/IP Kit  AM-SEK Kit (Serial-to-TCP)  Converts Serial to Ethernet  Allows Management over TCP/IP network  Allows for remote management (over the internet)
  • 23. Linear – Typical Installation Serial Cable Ethernet Cable Management PC 192.168.0.40 AE1000Plus Controller Ethernet Cable Router/Switch 192.168.0.0/24
  • 24.
  • 25. Software - AccessBase2000  Add/remove users  Entry codes  Directory codes  Cards  Transmitters  Manually toggle relays  View log reports  Communicates through serial  Requires a password to authenticate
  • 26.
  • 27.
  • 28. PC to Controller Communication  Request  5AA5000A1105010008000000CB97  Response  Acknowledged:5AA50004110C462 5  Not Acknowledged: 5AA50005110D024C23  Invalid Checksum: 5AA50005110D017EB8  No response (not authenticated) 5AA5000A11013635343332319A71 5AA50005110D024C23
  • 29. 5AA5000A11013635343332319A71 Packet Header Minimum Data Length Maximum Data Length Data (Hex) Checksum Net Node Command { Password = 01 Poll Status = 02 Poll Log = 03 Command = 04 Time = 05 Put Flash = 06 … } String is Hex Encoded
  • 31. So how do we target these controllers?  Physical Access  Local Programming  Serial port inside the controller
  • 33. AE-500 – Default Password  Hold 0 and 2 on the keypad  Type the default password: 123456#  Input the commands to add a new entry code  31#9999#9999#99#  Type in your new code (9999)  Access Granted!
  • 35.
  • 36. Master Key  Same key for all AE1000plus, AM3plus controllers  Purchase them from a supplier or on eBay  Or just pick the lock  Full access to the device
  • 37. Physical Access  Manual Relay Latch buttons  Toggle Relay  Lock their state
  • 38. Physical Access  Manual Relay Latch buttons  Toggle Relay  Lock their state  Programming buttons  Program device locally  Erase Memory  Active Phone Line  Serial connection to the controller
  • 39. Tamper Monitoring?  Magnetic tamper switch inside enclosure  No active alerts  Can be bypassed by placing a magnet on the outside of the enclosure
  • 40.
  • 41. So how do we target these controllers?  Physical Access  Local Programming  Serial port inside the controller
  • 42. So how do we target these controllers?  Physical Access  Local Programming  Serial port inside the controller  Internal Network Access  IP of Serial to TCP device  TCP Port 4660  External Network Access  IP of Serial to TCP device  TCP Port 4660 open to the internet 5AA5000A11013635343332319A71 5AA50005110D024C23 Bad Guy 5AA5000A11013635343332319A71 5AA50005110D024C23 192.168.0.32:4660 74.12.x.x:4660
  • 44. Demo
  • 45. Brute-force attack  No rate limiting  No password lockout  Small key space  Exactly 6 characters  Numeric only  Scriptable
  • 46. Demo
  • 47. No Password Necessary  Authentication not enforced!  Send unauthenticated commands  Any commands will execute  May not get any confirmation data Hacker Raw Connection AE1000Plus Controller
  • 48. Open Doors Remotely  Send one simple command  5AA5000A1105010000080000E88D  Triggers a relay for 2 seconds thus opening a door or gate  Great for movie style scenes 5AA5000A1105010000080000E88D Hacker Raw Connection AE1000Plus Controller Door 1 Access Granted
  • 49. Lock Doors Open/Closed  Keeps Doors/Gates open or closed  Will not respond to user input (RFID cards, remotes, etc)  Persist until manually unlocked or rebooted
  • 50. Delete Logs From The Controller  Controller keeps logs of events  Downloading logs deletes them from the controller  Hide evidence of entry or tampering
  • 51. Change the Password  Upload configuration settings  Change password without needing the previous password  Normal functionality remains  Upload other configuration changes
  • 52. Denial of Service  Fake database update will disable controller connected to or rebooted  Overwrite device firmware  Lock relays to prevent access
  • 53. ACAT – Access Control Attack Tool Demo
  • 55. Device Enumeration Techniques  Scan the network  Look for any COM port redirectors  Default port = TCP 4660  Send broadcast packet to UDP 55954  Devices will respond  Send a password request string to port 4660  5AA5000A11013635343332319A71  5AA50004110C4625  5AA50005110D024C23 5AA5000A11013635343332319A71 5AA50005110D024C23 UDP Broadcast Broadcast Response Client Response
  • 56. Demo
  • 57. Recommendations  Always change the default password  Change physical locks  Use a direct serial connection  If networked, utilize authentication  Resist opening the controller to the internet
  • 58. Final Thoughts  Other vendors  Ongoing research  Tool – More work is needed  Tool located on https://github.com/linuz/Access-Control-Attack-Tool  It’s currently just a prototype  Continue updating it/take it out of “PoC mode”  Working on an Nmap script  Slides uploaded to SlideShare www.slideshare.net/DennisMaldonado5
  • 59. Questions?  If you have any questions, you can:  Twitter: @DennisMald  Find me here at DEFCON23  Email me at: dmaldonado@klcconsulting.net

Hinweis der Redaktion

  1. Thank everyone for the opportunity to speak!
  2. Passion for Physical security and combining with with electronic aspects
  3. Physical Access Control System What they are Use cases Vendors Talk about a specific vendor of access control, the architecture, and how it communicates Attacks, local and remote Demo and tools Device enumeration Recommendations TALK ABOUT DEMO
  4. Control a variety of devices
  5. Selectively permit access to a protected resource or area. Authenticate users in a variety of ways. Some solutions utilize only some of these methods SHOW EXAMPLE: Use transmitters to open Doors 2-4
  6. Talk about the use cases I have seen while going through pictures on the next few slides Not limited to
  7. DKS (Doorking) Model 1834, 1835, 1837
  8. Elite EL2000, Elite Icon 26
  9. Owned by Chamberlain – Sentex Infinity S, Infinity M, Infinity L
  10. Owned by Chamberlain - EL1SS, EL2000
  11. Linear AE1000, AE1000plus, AE2000plus, AM3plus controllers Finally talk about what we will be focusing on Linear 1000plus, 2000plus, AM3plus are all the same 2000plus offers a bigger screen and more buttons AM3plus headless, no interface for users. Used for certain access situations (RFID only for example) or expansion of an existing system
  12. Condominiums downtown (note the use of a keypad and RFID reader)
  13. Gated communities
  14. Commercial buildings
  15. Elevator access on the left On the right, room with locked controllers for access control, networked together
  16. Access control controller (AM3plus) found in a bathroom. HERE IS ANOTHER ONE I FOUND
  17. Access control controller (AM3plus) found in a bathroom.
  18. Linear AE1000, AE1000plus, AE2000plus, AM3plus controllers Finally talk about what we will be focusing on Linear 1000plus, 2000plus, AM3plus are all the same 2000plus offers a bigger screen and more buttons AM3plus headless, no interface for users. Used for certain access situations (RFID only for example) or expansion of an existing system
  19. Smarter access control system
  20. Controllers are the ae1000,2000,am3plus Active phone line used for calling users or potentially managing the device in certain configurations AM-SEK used to allow these devices to be managed on a conventional TCP/IP network or potentially remotely over the internet. The managing computer will create a virtual serial port which will then connect to this serial-to-tcp device The most common use case I have seen in the field Network scan
  21. Controllers are the ae1000,2000,am3plus Active phone line used for calling users or potentially managing the device in certain configurations AM-SEK used to allow these devices to be managed on a conventional TCP/IP network or potentially remotely over the internet. The managing computer will create a virtual serial port which will then connect to this serial-to-tcp device The most common use case I have seen in the field Network scan
  22. Controller is connected to the serial-to-tcp interface which is then connected to the network. From there a computer on the local network can manage the controller using special software to interface with it. Documentation encourages external internet access by forwarding ports to the serial-to-tcp/ip interface. No authentication required -- So now that we understand how [this] is set up, lets talk about how a computer interfaces with the Linear Controller
  23. Software used to connect to the controller Requires a password to authenticate. Talk about how to download
  24. Putting in the password. Password is exactly 6 characters, numeric only. Application attempts the password when connecting Application will not do anything unless the correct password is put in
  25. Example of managing users
  26. PacketHeader is fixed, hard-coded Mimimum length of the data that will be sent Maximum length of the data Net Node which is the address of the controller relative to the other controllers on the network Command (1-16) such as pull log, push firmware, query status, etc Data itself. The data is the ASCII encoded values of each character which is then converted to hex and sent over the virtual serial connection Check sum which is used to check the validity of the message. Calculated from the NetNode, command, and data values.
  27. Find devices by scanning the network (nmap)
  28. So now that we talked about the remote attacks, lets assume that these devices are not networked or are the versions that do not support networking.
  29. AE-500 does not support networked configuration and is programmed locally from the keypad. The AE-5000 is used for much smaller installations Default password, rarely ever changed from what I have seen in the field Use key combination with the default password to backdoor the controller in under 10 seconds
  30. PacketHeader is fixed, hard-coded Mimimum length of the data that will be sent Maximum length of the data Net Node which is the address of the controller relative to the other controllers on the network Command (1-16) such as pull log, push firmware, query status, etc Data itself. The data is the ASCII encoded values of each character which is then converted to hex and sent over the virtual serial connection Check sum which is used to check the validity of the message. Calculated from the NetNode, command, and data values.
  31. Video of utilizing the default password on the keypad to create my own entry code Commentate video while playing
  32. At least all AE1000plus and AM3plus share the same key regardless of supplier Obtain the key from the vendor, a supplier, or purchase them off eBay (enclosures) You could also pick the lock if you are so inclined Physical access to the inside of the controller will give you full access
  33. Toggle relays to open doors or gates
  34. Manually re-program some controllers or completely reset the controllers Active phone line, find the phone number and use it to call the device. You may be able to program the device from the phone if you know the master password (default=123456) Serial connection to the controller for attacks (raspberry pi to make it networked/backdoored)
  35. Tamper switch used for monitoring when the enclosure is opened or closed No active alerts, need to download the logs and view the logs for any tamper events Can be rendered useless by placing a magnet at the right place
  36. Video of bypassing magnetic tamper switch Commentate video while playing
  37. So now that we talked about physical access, lets talk about targeting these devices via the network or internet
  38. Find devices by scanning the network (nmap)
  39. Lets get into the fun stuff
  40. Show the accessbase software and trying to log into it resulting in “Wrong Password” (Client password should be set to 123456 while controller should be set to 000051 or something else)
  41. A password is “required” to configure the device. There is no rate limit or password lockout so you can just keep sending guesses in a typical bruteforce fashion. The speed is limited by the speed of the virtual serial connection Exactly 1,000,000 combinations to test Testing full keyspace would take about 114 hours which is about 4.75 days
  42. Demo the brute force script. Finish talking BEFORE the attack is finished! Show the access base software, logging into it and triggering relays Demo downloading logs normally after bruteforcing password
  43. Authentication is “required” but not enforced You can send serial commands through the virtual serial connection which will be executed by the controller Does not require a password or prior authentication Most commands will not return any data if the user has not authenticated recently, however, they will still execute. What can we do wit this?
  44. Trigger the controller’s relays! Send one command and the specific relay will trigger for x number of seconds depending on configuration (2 by default) Just like if someone was granted access normally using an entry code or RFID card for example Logged as request to exit so it would be hard to detect this was done illegitimately after the fact Scenario: Classic movie scenario where you have a team of jewelry thieves who enter the building after the hacker on the team who is setting in a van across the street hacks into the access control network with his or her laptop and grants them access into the building
  45. Lock relay state to either open or closed Effectively locks doors, gates, or whatever to open or closed state, making them unresponsive to valid user. Keep a door open or keep it closed Persists until manually unlocked or the controller is rebooted
  46. The controller logs most things including access denied, access granted, controller enclosure is opened (tamper switch) device rebooted, and more Every time the logs are downloaded from the controller into the application, the logs are deleted from the controller to save space. Initiate a log download, and the logs are deleted from the controller! Hides any evidence of entry or tampering with the controller
  47. Upload configuration without authentication which can be used to change the password without needing the previous password Controller continues to function normally Can upload other changes such as entry codes or transmitters (backdoor)
  48. Prevent people from using the controller Lock relays to prevent access to doors or gates Fake a database update which will effectively disable the controller until someone else authenticates to it or the device is rebooted Overwrite the devices firmware to brick the device
  49. Show entire tool in windows, including deleting logs
  50. UDP broadcast is animated
  51. Demo of DetectLinear tool
  52. Always change the default password Do not network these if you don’t have to (direct serial connection) If you have to network this, utilize authentication everywhere (including the serial-to-tcp device) Don’t open this to the internet Change the lock to something more secure
  53. Still working on my research. I do hope to cover more on this and other vendors as well. These issues are not limited to any one vendor Need to finish the tool (make some fixes/updates) Working on more security research on that focuses to joining the physical and electronic space.
  54. Q/A session