SlideShare a Scribd company logo
1 of 59
Are We Really Safe?
HACKING ACCESS CONTROL SYSTEMS
Dennis Maldonado
 Security Consultant @ KLC Consulting
 Twitter: @DennisMald
 Houston Locksport Co-founder
http://www.meetup.com/Houston-Locksport/
Agenda
 Physical Access Control System
 Linear Commercial Access Control Systems
 Attacks
 Local
 Remote
 Demo/Tools
 Device Enumeration Techniques
 Recommendations
Physical Access Control Systems
Physical Access Control
What do they do?
Limiting access to physical location/resource
 Secure areas using:
 Doors
 Gates
 Elevators floors
 Barrier Arms
 Access control systems
 Keypad Entry (Entry/Directory codes)
 Telephone entry
 Radio receivers for remotes
 Proximity cards (RFID)
 Swipe cards
 Sensors
Physical Access Control
How do they work?
Where are they used?
 Use cases:
 Gated Communities
 Parking Garages
 Office Buildings
 Apartments
 Hotels/Motels
 Commercial Buildings
 Recreational Facilities
 Medical Facilities
Doorking
Chamberlain
Sentex
LiftMaster
Nortek Security & Control/Linear Controllers
Linear Commercial Access Control
Nortek Security & Control/Linear Controllers
AE1000Plus
AE2000Plus
AM3Plus
Linear Controller
 Commercial Telephone Entry
System
 Utilizes a telephone line
 Supports thousands of users
 Networked with other controllers
 Can be configured/controlled
through a PC
 Serial Connection
Linear – TCP/IP Kit
 AM-SEK Kit (Serial-to-TCP)
 Converts Serial to Ethernet
 Allows Management over TCP/IP
network
 Allows for remote management
(over the internet)
Linear – Typical Installation
Serial
Cable
Ethernet
Cable
Management PC
192.168.0.40
AE1000Plus
Controller
Ethernet
Cable
Router/Switch
192.168.0.0/24
Software - AccessBase2000
 Add/remove users
 Entry codes
 Directory codes
 Cards
 Transmitters
 Manually toggle relays
 View log reports
 Communicates through serial
 Requires a password to
authenticate
PC to Controller Communication
 Request
 5AA5000A1105010008000000CB97
 Response
 Acknowledged:5AA50004110C462
5
 Not Acknowledged:
5AA50005110D024C23
 Invalid Checksum:
5AA50005110D017EB8
 No response (not authenticated)
5AA5000A11013635343332319A71
5AA50005110D024C23
5AA5000A11013635343332319A71
Packet
Header
Minimum
Data Length
Maximum
Data Length
Data
(Hex)
Checksum
Net
Node
Command
{
Password = 01
Poll Status = 02
Poll Log = 03
Command = 04
Time = 05
Put Flash = 06
…
}
String is Hex Encoded
Attacks
LOCAL AND REMOTE ATTACKS
So how do we target these
controllers?
 Physical Access
 Local Programming
 Serial port inside the controller
Local Attacks
AE-500 – Default Password
 Hold 0 and 2 on the keypad
 Type the default password:
123456#
 Input the commands to add a
new entry code
 31#9999#9999#99#
 Type in your new code (9999)
 Access Granted!
123456#31#9999#9999#99#
Enter
Programming
Mode
Enter Entry
Code
Confirm
New Entry
Code
Exit
Programming
Mode
New Entry Code
Master Key
 Same key for all AE1000plus,
AM3plus controllers
 Purchase them from a supplier or
on eBay
 Or just pick the lock
 Full access to the device
Physical Access
 Manual Relay Latch buttons
 Toggle Relay
 Lock their state
Physical Access
 Manual Relay Latch buttons
 Toggle Relay
 Lock their state
 Programming buttons
 Program device locally
 Erase Memory
 Active Phone Line
 Serial connection to the controller
Tamper Monitoring?
 Magnetic tamper switch inside
enclosure
 No active alerts
 Can be bypassed by placing a
magnet on the outside of the
enclosure
So how do we target these
controllers?
 Physical Access
 Local Programming
 Serial port inside the controller
So how do we target these
controllers?
 Physical Access
 Local Programming
 Serial port inside the controller
 Internal Network Access
 IP of Serial to TCP device
 TCP Port 4660
 External Network Access
 IP of Serial to TCP device
 TCP Port 4660 open to the internet
5AA5000A11013635343332319A71
5AA50005110D024C23
Bad Guy
5AA5000A11013635343332319A71
5AA50005110D024C23
192.168.0.32:4660
74.12.x.x:4660
Remote Attacks
Demo
Brute-force attack
 No rate limiting
 No password lockout
 Small key space
 Exactly 6 characters
 Numeric only
 Scriptable
Demo
No Password Necessary
 Authentication not enforced!
 Send unauthenticated commands
 Any commands will execute
 May not get any confirmation
data
Hacker
Raw Connection
AE1000Plus
Controller
Open Doors Remotely
 Send one simple command
 5AA5000A1105010000080000E88D
 Triggers a relay for 2 seconds thus
opening a door or gate
 Great for movie style scenes
5AA5000A1105010000080000E88D
Hacker
Raw Connection
AE1000Plus
Controller
Door 1
Access
Granted
Lock Doors Open/Closed
 Keeps Doors/Gates open
or closed
 Will not respond to user
input (RFID cards, remotes,
etc)
 Persist until manually
unlocked or rebooted
Delete Logs From The Controller
 Controller keeps logs of events
 Downloading logs deletes them
from the controller
 Hide evidence of entry or
tampering
Change the Password
 Upload configuration settings
 Change password without
needing the previous password
 Normal functionality remains
 Upload other configuration
changes
Denial of Service
 Fake database update will disable
controller connected to or
rebooted
 Overwrite device firmware
 Lock relays to prevent access
ACAT – Access Control Attack Tool
Demo
Locating Controllers
Device Enumeration Techniques
 Scan the network
 Look for any COM port redirectors
 Default port = TCP 4660
 Send broadcast packet to UDP 55954
 Devices will respond
 Send a password request string to port
4660
 5AA5000A11013635343332319A71
 5AA50004110C4625
 5AA50005110D024C23
5AA5000A11013635343332319A71
5AA50005110D024C23
UDP Broadcast
Broadcast
Response
Client
Response
Demo
Recommendations
 Always change the default password
 Change physical locks
 Use a direct serial connection
 If networked, utilize authentication
 Resist opening the controller to the
internet
Final Thoughts
 Other vendors
 Ongoing research
 Tool – More work is needed
 Tool located on https://github.com/linuz/Access-Control-Attack-Tool
 It’s currently just a prototype
 Continue updating it/take it out of “PoC mode”
 Working on an Nmap script
 Slides uploaded to SlideShare
www.slideshare.net/DennisMaldonado5
Questions?
 If you have any questions, you can:
 Twitter: @DennisMald
 Find me here at DEFCON23
 Email me at: dmaldonado@klcconsulting.net

More Related Content

What's hot

VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxDARSHANBHAVSAR14
 
A7 Missing Function Level Access Control
A7   Missing Function Level Access ControlA7   Missing Function Level Access Control
A7 Missing Function Level Access Controlstevil1224
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Access Control for Windows
Access Control for Windows Access Control for Windows
Access Control for Windows ayousif
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault
Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault
Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault Outlyer
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilitiesebusinessmantra
 
50 Shades of Sigma
50 Shades of Sigma50 Shades of Sigma
50 Shades of SigmaFlorian Roth
 

What's hot (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
Social engineering
Social engineering Social engineering
Social engineering
 
A7 Missing Function Level Access Control
A7   Missing Function Level Access ControlA7   Missing Function Level Access Control
A7 Missing Function Level Access Control
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Access Control for Windows
Access Control for Windows Access Control for Windows
Access Control for Windows
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault
Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault
Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilities
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
50 Shades of Sigma
50 Shades of Sigma50 Shades of Sigma
50 Shades of Sigma
 

Similar to Hacking Access Control Systems

Turnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CatalogueTurnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CataloguePERCo
 
HWg-Juno 404 - Datasheet
HWg-Juno 404 - DatasheetHWg-Juno 404 - Datasheet
HWg-Juno 404 - DatasheetSiemens
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securitypptSachin Roy
 
protegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- systemprotegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- systemNikolaSecuriton
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Technology
 
Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008jeremyomeara
 
Bosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data SheetBosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data SheetJMAC Supply
 
In bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systemsIn bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systemsMayank Jain
 
MOX IRIS Video Door Phone
MOX IRIS Video Door PhoneMOX IRIS Video Door Phone
MOX IRIS Video Door Phonemoxreview
 
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET Journal
 
Cyber Defense - Annunciators as watcher for critical process applications
Cyber Defense - Annunciators as watcher for critical process applicationsCyber Defense - Annunciators as watcher for critical process applications
Cyber Defense - Annunciators as watcher for critical process applicationsM.S. Jacobs & Associates
 
Application of alarm annunciator as cyber security layer
Application of alarm annunciator as cyber security layerApplication of alarm annunciator as cyber security layer
Application of alarm annunciator as cyber security layerBelilove Company-Engineers
 
Improve Process Control Security Using Annunciators as Watchers
Improve Process Control Security Using Annunciators as WatchersImprove Process Control Security Using Annunciators as Watchers
Improve Process Control Security Using Annunciators as WatchersFlow-Tech, Inc.
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric PresentationDarrell Smith
 

Similar to Hacking Access Control Systems (20)

Turnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CatalogueTurnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo Catalogue
 
HWg-Juno 404 - Datasheet
HWg-Juno 404 - DatasheetHWg-Juno 404 - Datasheet
HWg-Juno 404 - Datasheet
 
Ad830 user manual
Ad830 user manualAd830 user manual
Ad830 user manual
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
 
protegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- systemprotegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- system
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARD
 
Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008
 
Bosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data SheetBosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data Sheet
 
Homeautomation
HomeautomationHomeautomation
Homeautomation
 
Homeautomation
HomeautomationHomeautomation
Homeautomation
 
In bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systemsIn bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systems
 
MOX IRIS Video Door Phone
MOX IRIS Video Door PhoneMOX IRIS Video Door Phone
MOX IRIS Video Door Phone
 
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
 
Automatic Dialing Alert System / Remote Indication System
Automatic Dialing Alert System / Remote Indication SystemAutomatic Dialing Alert System / Remote Indication System
Automatic Dialing Alert System / Remote Indication System
 
Hotel locks-e790-brochure
Hotel locks-e790-brochureHotel locks-e790-brochure
Hotel locks-e790-brochure
 
Hasco english
Hasco englishHasco english
Hasco english
 
Cyber Defense - Annunciators as watcher for critical process applications
Cyber Defense - Annunciators as watcher for critical process applicationsCyber Defense - Annunciators as watcher for critical process applications
Cyber Defense - Annunciators as watcher for critical process applications
 
Application of alarm annunciator as cyber security layer
Application of alarm annunciator as cyber security layerApplication of alarm annunciator as cyber security layer
Application of alarm annunciator as cyber security layer
 
Improve Process Control Security Using Annunciators as Watchers
Improve Process Control Security Using Annunciators as WatchersImprove Process Control Security Using Annunciators as Watchers
Improve Process Control Security Using Annunciators as Watchers
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Hacking Access Control Systems

  • 1. Are We Really Safe? HACKING ACCESS CONTROL SYSTEMS
  • 2. Dennis Maldonado  Security Consultant @ KLC Consulting  Twitter: @DennisMald  Houston Locksport Co-founder http://www.meetup.com/Houston-Locksport/
  • 3. Agenda  Physical Access Control System  Linear Commercial Access Control Systems  Attacks  Local  Remote  Demo/Tools  Device Enumeration Techniques  Recommendations
  • 5. Physical Access Control What do they do? Limiting access to physical location/resource  Secure areas using:  Doors  Gates  Elevators floors  Barrier Arms
  • 6.  Access control systems  Keypad Entry (Entry/Directory codes)  Telephone entry  Radio receivers for remotes  Proximity cards (RFID)  Swipe cards  Sensors Physical Access Control How do they work?
  • 7. Where are they used?  Use cases:  Gated Communities  Parking Garages  Office Buildings  Apartments  Hotels/Motels  Commercial Buildings  Recreational Facilities  Medical Facilities
  • 12. Nortek Security & Control/Linear Controllers
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20. Nortek Security & Control/Linear Controllers AE1000Plus AE2000Plus AM3Plus
  • 21. Linear Controller  Commercial Telephone Entry System  Utilizes a telephone line  Supports thousands of users  Networked with other controllers  Can be configured/controlled through a PC  Serial Connection
  • 22. Linear – TCP/IP Kit  AM-SEK Kit (Serial-to-TCP)  Converts Serial to Ethernet  Allows Management over TCP/IP network  Allows for remote management (over the internet)
  • 23. Linear – Typical Installation Serial Cable Ethernet Cable Management PC 192.168.0.40 AE1000Plus Controller Ethernet Cable Router/Switch 192.168.0.0/24
  • 24.
  • 25. Software - AccessBase2000  Add/remove users  Entry codes  Directory codes  Cards  Transmitters  Manually toggle relays  View log reports  Communicates through serial  Requires a password to authenticate
  • 26.
  • 27.
  • 28. PC to Controller Communication  Request  5AA5000A1105010008000000CB97  Response  Acknowledged:5AA50004110C462 5  Not Acknowledged: 5AA50005110D024C23  Invalid Checksum: 5AA50005110D017EB8  No response (not authenticated) 5AA5000A11013635343332319A71 5AA50005110D024C23
  • 29. 5AA5000A11013635343332319A71 Packet Header Minimum Data Length Maximum Data Length Data (Hex) Checksum Net Node Command { Password = 01 Poll Status = 02 Poll Log = 03 Command = 04 Time = 05 Put Flash = 06 … } String is Hex Encoded
  • 31. So how do we target these controllers?  Physical Access  Local Programming  Serial port inside the controller
  • 33. AE-500 – Default Password  Hold 0 and 2 on the keypad  Type the default password: 123456#  Input the commands to add a new entry code  31#9999#9999#99#  Type in your new code (9999)  Access Granted!
  • 35.
  • 36. Master Key  Same key for all AE1000plus, AM3plus controllers  Purchase them from a supplier or on eBay  Or just pick the lock  Full access to the device
  • 37. Physical Access  Manual Relay Latch buttons  Toggle Relay  Lock their state
  • 38. Physical Access  Manual Relay Latch buttons  Toggle Relay  Lock their state  Programming buttons  Program device locally  Erase Memory  Active Phone Line  Serial connection to the controller
  • 39. Tamper Monitoring?  Magnetic tamper switch inside enclosure  No active alerts  Can be bypassed by placing a magnet on the outside of the enclosure
  • 40.
  • 41. So how do we target these controllers?  Physical Access  Local Programming  Serial port inside the controller
  • 42. So how do we target these controllers?  Physical Access  Local Programming  Serial port inside the controller  Internal Network Access  IP of Serial to TCP device  TCP Port 4660  External Network Access  IP of Serial to TCP device  TCP Port 4660 open to the internet 5AA5000A11013635343332319A71 5AA50005110D024C23 Bad Guy 5AA5000A11013635343332319A71 5AA50005110D024C23 192.168.0.32:4660 74.12.x.x:4660
  • 44. Demo
  • 45. Brute-force attack  No rate limiting  No password lockout  Small key space  Exactly 6 characters  Numeric only  Scriptable
  • 46. Demo
  • 47. No Password Necessary  Authentication not enforced!  Send unauthenticated commands  Any commands will execute  May not get any confirmation data Hacker Raw Connection AE1000Plus Controller
  • 48. Open Doors Remotely  Send one simple command  5AA5000A1105010000080000E88D  Triggers a relay for 2 seconds thus opening a door or gate  Great for movie style scenes 5AA5000A1105010000080000E88D Hacker Raw Connection AE1000Plus Controller Door 1 Access Granted
  • 49. Lock Doors Open/Closed  Keeps Doors/Gates open or closed  Will not respond to user input (RFID cards, remotes, etc)  Persist until manually unlocked or rebooted
  • 50. Delete Logs From The Controller  Controller keeps logs of events  Downloading logs deletes them from the controller  Hide evidence of entry or tampering
  • 51. Change the Password  Upload configuration settings  Change password without needing the previous password  Normal functionality remains  Upload other configuration changes
  • 52. Denial of Service  Fake database update will disable controller connected to or rebooted  Overwrite device firmware  Lock relays to prevent access
  • 53. ACAT – Access Control Attack Tool Demo
  • 55. Device Enumeration Techniques  Scan the network  Look for any COM port redirectors  Default port = TCP 4660  Send broadcast packet to UDP 55954  Devices will respond  Send a password request string to port 4660  5AA5000A11013635343332319A71  5AA50004110C4625  5AA50005110D024C23 5AA5000A11013635343332319A71 5AA50005110D024C23 UDP Broadcast Broadcast Response Client Response
  • 56. Demo
  • 57. Recommendations  Always change the default password  Change physical locks  Use a direct serial connection  If networked, utilize authentication  Resist opening the controller to the internet
  • 58. Final Thoughts  Other vendors  Ongoing research  Tool – More work is needed  Tool located on https://github.com/linuz/Access-Control-Attack-Tool  It’s currently just a prototype  Continue updating it/take it out of “PoC mode”  Working on an Nmap script  Slides uploaded to SlideShare www.slideshare.net/DennisMaldonado5
  • 59. Questions?  If you have any questions, you can:  Twitter: @DennisMald  Find me here at DEFCON23  Email me at: dmaldonado@klcconsulting.net

Editor's Notes

  1. Thank everyone for the opportunity to speak!
  2. Passion for Physical security and combining with with electronic aspects
  3. Physical Access Control System What they are Use cases Vendors Talk about a specific vendor of access control, the architecture, and how it communicates Attacks, local and remote Demo and tools Device enumeration Recommendations TALK ABOUT DEMO
  4. Control a variety of devices
  5. Selectively permit access to a protected resource or area. Authenticate users in a variety of ways. Some solutions utilize only some of these methods SHOW EXAMPLE: Use transmitters to open Doors 2-4
  6. Talk about the use cases I have seen while going through pictures on the next few slides Not limited to
  7. DKS (Doorking) Model 1834, 1835, 1837
  8. Elite EL2000, Elite Icon 26
  9. Owned by Chamberlain – Sentex Infinity S, Infinity M, Infinity L
  10. Owned by Chamberlain - EL1SS, EL2000
  11. Linear AE1000, AE1000plus, AE2000plus, AM3plus controllers Finally talk about what we will be focusing on Linear 1000plus, 2000plus, AM3plus are all the same 2000plus offers a bigger screen and more buttons AM3plus headless, no interface for users. Used for certain access situations (RFID only for example) or expansion of an existing system
  12. Condominiums downtown (note the use of a keypad and RFID reader)
  13. Gated communities
  14. Commercial buildings
  15. Elevator access on the left On the right, room with locked controllers for access control, networked together
  16. Access control controller (AM3plus) found in a bathroom. HERE IS ANOTHER ONE I FOUND
  17. Access control controller (AM3plus) found in a bathroom.
  18. Linear AE1000, AE1000plus, AE2000plus, AM3plus controllers Finally talk about what we will be focusing on Linear 1000plus, 2000plus, AM3plus are all the same 2000plus offers a bigger screen and more buttons AM3plus headless, no interface for users. Used for certain access situations (RFID only for example) or expansion of an existing system
  19. Smarter access control system
  20. Controllers are the ae1000,2000,am3plus Active phone line used for calling users or potentially managing the device in certain configurations AM-SEK used to allow these devices to be managed on a conventional TCP/IP network or potentially remotely over the internet. The managing computer will create a virtual serial port which will then connect to this serial-to-tcp device The most common use case I have seen in the field Network scan
  21. Controllers are the ae1000,2000,am3plus Active phone line used for calling users or potentially managing the device in certain configurations AM-SEK used to allow these devices to be managed on a conventional TCP/IP network or potentially remotely over the internet. The managing computer will create a virtual serial port which will then connect to this serial-to-tcp device The most common use case I have seen in the field Network scan
  22. Controller is connected to the serial-to-tcp interface which is then connected to the network. From there a computer on the local network can manage the controller using special software to interface with it. Documentation encourages external internet access by forwarding ports to the serial-to-tcp/ip interface. No authentication required -- So now that we understand how [this] is set up, lets talk about how a computer interfaces with the Linear Controller
  23. Software used to connect to the controller Requires a password to authenticate. Talk about how to download
  24. Putting in the password. Password is exactly 6 characters, numeric only. Application attempts the password when connecting Application will not do anything unless the correct password is put in
  25. Example of managing users
  26. PacketHeader is fixed, hard-coded Mimimum length of the data that will be sent Maximum length of the data Net Node which is the address of the controller relative to the other controllers on the network Command (1-16) such as pull log, push firmware, query status, etc Data itself. The data is the ASCII encoded values of each character which is then converted to hex and sent over the virtual serial connection Check sum which is used to check the validity of the message. Calculated from the NetNode, command, and data values.
  27. Find devices by scanning the network (nmap)
  28. So now that we talked about the remote attacks, lets assume that these devices are not networked or are the versions that do not support networking.
  29. AE-500 does not support networked configuration and is programmed locally from the keypad. The AE-5000 is used for much smaller installations Default password, rarely ever changed from what I have seen in the field Use key combination with the default password to backdoor the controller in under 10 seconds
  30. PacketHeader is fixed, hard-coded Mimimum length of the data that will be sent Maximum length of the data Net Node which is the address of the controller relative to the other controllers on the network Command (1-16) such as pull log, push firmware, query status, etc Data itself. The data is the ASCII encoded values of each character which is then converted to hex and sent over the virtual serial connection Check sum which is used to check the validity of the message. Calculated from the NetNode, command, and data values.
  31. Video of utilizing the default password on the keypad to create my own entry code Commentate video while playing
  32. At least all AE1000plus and AM3plus share the same key regardless of supplier Obtain the key from the vendor, a supplier, or purchase them off eBay (enclosures) You could also pick the lock if you are so inclined Physical access to the inside of the controller will give you full access
  33. Toggle relays to open doors or gates
  34. Manually re-program some controllers or completely reset the controllers Active phone line, find the phone number and use it to call the device. You may be able to program the device from the phone if you know the master password (default=123456) Serial connection to the controller for attacks (raspberry pi to make it networked/backdoored)
  35. Tamper switch used for monitoring when the enclosure is opened or closed No active alerts, need to download the logs and view the logs for any tamper events Can be rendered useless by placing a magnet at the right place
  36. Video of bypassing magnetic tamper switch Commentate video while playing
  37. So now that we talked about physical access, lets talk about targeting these devices via the network or internet
  38. Find devices by scanning the network (nmap)
  39. Lets get into the fun stuff
  40. Show the accessbase software and trying to log into it resulting in “Wrong Password” (Client password should be set to 123456 while controller should be set to 000051 or something else)
  41. A password is “required” to configure the device. There is no rate limit or password lockout so you can just keep sending guesses in a typical bruteforce fashion. The speed is limited by the speed of the virtual serial connection Exactly 1,000,000 combinations to test Testing full keyspace would take about 114 hours which is about 4.75 days
  42. Demo the brute force script. Finish talking BEFORE the attack is finished! Show the access base software, logging into it and triggering relays Demo downloading logs normally after bruteforcing password
  43. Authentication is “required” but not enforced You can send serial commands through the virtual serial connection which will be executed by the controller Does not require a password or prior authentication Most commands will not return any data if the user has not authenticated recently, however, they will still execute. What can we do wit this?
  44. Trigger the controller’s relays! Send one command and the specific relay will trigger for x number of seconds depending on configuration (2 by default) Just like if someone was granted access normally using an entry code or RFID card for example Logged as request to exit so it would be hard to detect this was done illegitimately after the fact Scenario: Classic movie scenario where you have a team of jewelry thieves who enter the building after the hacker on the team who is setting in a van across the street hacks into the access control network with his or her laptop and grants them access into the building
  45. Lock relay state to either open or closed Effectively locks doors, gates, or whatever to open or closed state, making them unresponsive to valid user. Keep a door open or keep it closed Persists until manually unlocked or the controller is rebooted
  46. The controller logs most things including access denied, access granted, controller enclosure is opened (tamper switch) device rebooted, and more Every time the logs are downloaded from the controller into the application, the logs are deleted from the controller to save space. Initiate a log download, and the logs are deleted from the controller! Hides any evidence of entry or tampering with the controller
  47. Upload configuration without authentication which can be used to change the password without needing the previous password Controller continues to function normally Can upload other changes such as entry codes or transmitters (backdoor)
  48. Prevent people from using the controller Lock relays to prevent access to doors or gates Fake a database update which will effectively disable the controller until someone else authenticates to it or the device is rebooted Overwrite the devices firmware to brick the device
  49. Show entire tool in windows, including deleting logs
  50. UDP broadcast is animated
  51. Demo of DetectLinear tool
  52. Always change the default password Do not network these if you don’t have to (direct serial connection) If you have to network this, utilize authentication everywhere (including the serial-to-tcp device) Don’t open this to the internet Change the lock to something more secure
  53. Still working on my research. I do hope to cover more on this and other vendors as well. These issues are not limited to any one vendor Need to finish the tool (make some fixes/updates) Working on more security research on that focuses to joining the physical and electronic space.
  54. Q/A session