Current Security Issue Demonstration Paper: Exploiting ZigBee Networks
|
|
- Ada O’Brien’
- 5 years ago
- Views:
Transcription
1 Current Security Issue Demonstration Paper: Exploiting ZigBee Networks Omar Taylor and Tyler Much The Vulnerability This exploit was performed specifically on a ZigBee pro 1.2 network, that was being run by Samsung SmartThings home security system. The purpose of this exploit is to steal the ZigBee network key; allowing you to decrypt all network traffic, spoof devices, or even commands. The exploit is possible on other ZigBee networks, but it will depend upon the implementation of the ZigBee protocol. Details: Using your choice of packet capture software and a USB ZigBee RF sniffer it is possible to intercept a ZigBee network key when devices are joined to the smart home system. This joining process can happen in many circumstances, one being a hard reset on the smart home central hub, a device losing connection and attempting to reconnect, or when trying to add a new device. Once the key is intercepted, it can be decrypted using a publicly available encryption key (usually found on the hardware manufacturer's website/documentation). Risk Exposure: The repercussions of the network key being stolen and decrypted are potentially high. With access to the ZigBee network key, all traffic over that network is visible. This would allow somebody to conduct extensive surveillance of that system, since all traffic is now decrypted. This could also be taken a step further and the key can be used to spoof devices on the network. An attacker using this key would be able to issue commands to connected systems. A dangerous and high impact example would be if an attacker issued an unlock/disconnect command to a connected SmartLock and was able to remotely unlock your doors and enter your home.
2 Class Relevance: This is type of attack is similar to some Man in the middle attacks we discussed in class (like the MD5 collision homework), although this one is even less complicated since they key doesn t have to be cracked, being that the symmetric decryption key is publicly available. The exploits are similar though, because once they key is decrypted it is possible to use it to authenticate and/or issue commands. This also relates back to the beginning of the semester when we covered cryptography, and decrypted encoded messages for homework. Tool Box: Finding and Exploiting the Vulnerability Where to find the tools While a variety of RF capturing devices can be used, we tested two: The Texas Instrument CC2531Emk and the Atmel RZ Raven USB stick flashed with the KillerBee Python framework. One of the devices requires RF capturing software to be flashed onto the device before using while the other comes with the software built-in. Your choice hardware is dependent on your purpose, but for our purposes, it was not necessary to use the KillerBee framework since we did not have time to fully test the attack suite that comes bundled with the software (something the CC2531Emk is not capable of). The TI CC2531 and RZ Raven can be purchased from multiple places such as the manufacturer's website, Digikey, Mouser, or even Amazon. If you re using the RZ Raven, RF capturing and key decryption can all be done in the command line. If you re using the TI CC2531(The one we used in the final exploit), sniffing and decryption can be done with an IEEE Protocol Analyzer software called Ubiqua. How the tool exploits the vulnerability: With the TI CC2531 connected to the attacker's computer and Ubiqua (Protocol Analyzer software), an attacker is able to exploit the vulnerability in the implementation of the ZigBee protocol. The attacker is able to get the symmetric decryption key from the manufacturer website (or anywhere online). Then the attacker is able to enter this key into protocol analyzer, which is then used to encrypt the private network key and capture the network traffic. Any time there is a network join the attacker will be able to see the contents of the transported key due to the systems weak (or essentially nonexistent) security for key transport. With the RZ Raven, the same is possible within the command-line. There are also methods of provoking the victim to rejoin their devices
3 with the RZ Raven by using the flashed KillerBee software attack suite (replay attacks, signal jamming, etc). Post-exploitation Once both symmetric keys are obtained, all traffic on the ZigBee network becomes visible. This would allow an attacker to monitor traffic in and out of the house, and see the status of devices connected to the system. There are also more complex attacks that could be carried out, such as spoofing, jamming or disabling the devices. This vulnerability in the ZigBee network is not a theoretical concept at this point. It would be fairly easy for an attacker to set this up, and exploit the vulnerability in its current state. The patch that is in development will make the vulnerability more theoretical since you would have to be monitoring the network constantly, and wait for a reset/new device setup. Reducing the Exploitability of your ZigBee Network There is currently no patch available for the vulnerabilities in this exploit. A patch is being developed, but it is not available for public release yet. The risk could still be reduced by not connecting systems that provide more important security. For example, by not connecting a door lock you would reduce the risk of the exploit having a significant impact. If the attacker was only able to gather data from a motion sensor and a smart light bulb, it is not likely they would find much useful information. When the patch is released (ZigBee 3.0) the symmetric key pair that was part of the exploit will be no more. Instead, each connected smart device will get a unique network key that is assigned to them. This change will make it so that the traffic across this network isn t all encrypted with the same key making it more challenging to decode traffic. The next patch will also give an option to disable insecure rejoin. This will make the current exploit obsolete because it prevents the network key from being transmitted on an auto-rejoin, and therefore requires the attacker to be listening when the device is initially added to the system (or the system is being reset). Tutorial
4 Setting up the Vulnerable System The system we used to perform the exploit on is the Samsung SmartThings home automation starter kit, a suite of ZigBee-enabled devices for which are susceptible to the attack we are going to carry out. In order to properly operate the system, it was necessary to download the recommended SmartThings application. To acquire and set up this system, follow the instructions below: 1. Acquire a Samsung SmartThings Kit ($ or less with coupon), an ethernet cord, and a lamp (optional). 2. Download the SmartThings app (Apple App Store, Google Play Store, Windows Store). 3. Sign-up for a SmartThings account a. Start the SmartThings application b. Tap the Sign Up button and fill out all the credentials (Name, , password) c. Tap the Create Account button d. Select a country and continue to the next screen, but don t do anything yet. 4. Setup the SmartThings Environment a. The SmartThings kit (depending on which your purchased) comes with a Hub (the node that begins the network can send and receive commands via Wi-Fi) and several devices that communicate with each other and the hub on personal area network (PAN). b. Connect the power cord that comes with the kit to the SmartThings Hub. You should see a flashing blue light on the front when power is being delivered. c.
5 d. The flashing blue light means a network cannot be found. To solve this, connect the ethernet cord to the Hub. You should see orange and green lights turn on in the port if done correctly. e. f. Return to the SmartThings application to link your Hub to your account. g. Your screen should have left off on a page that asks for an activation code. Enter that code (should have come with the kit) and hit next. h. Your Hub should now set itself up. If the blue light stops flashing, that means it has found a network and is trying to connect to it. If the light turns purple, your Hub is downloading firmware upgrades. If the light turns solid green, your hub is connected and ready to go (the application should notify you of this). i. Tap next and you ll move on to the next screen to set up your location. 5. Define a Location a. Tap Grant Location Permission and allow the app to know your GPS coordinates. b. Name your location. c. Tap This is My Location to confirm the area. You can always change the location if needed. d. If you get a message of success you are done and the environment should be ready to start adding devices to the network. Setting up the Exploitation Environment To carry out the exploit we will at least need a device capable of capturing (sniffing) ZigBee network traffic and software to decode the captured radio frequency packets. There are a
6 number of implementations of this environment. Some will require you to flash software to the radio device in order to even begin capturing traffic while other will have the software already packaged with the hardware. We will demonstrate two ways to do this. Option 1: Texas Instrument CC2531 USB Evaluation Module Kit In order for this to work, you need a Windows computer. 1. Acquire a TI CC2531 USB Evaluation Module Kit ($49.00). 2. Download the firmware for the USB module. 3. Run the Setup_SmartRF_Packet_Sniffer_ executable all the way through. 4. Wireshark is not configured to work for the CC2531 USB module so you ll have to use a software called Ubiqua (which is far more user friendly) Head to the Ubiqua website and click Try it out Click Activate Free Evaluation 4.3. Click Create a new account Download the stable build and run the executable all the way through Run Ubiqua and use the activation code you were given to activate the software. The software should look like this when you start it up. 5. In the Device Manager Window pane click Add Device and select the Texas Instrument local device. The device should now be added to the Device Manager Window pane.
7
8 6. Click the switch to begin capturing traffic. 7. You may not immediately start seeing traffic and that is most likely because the network is communicating on a different channel (Ubiqua defaults to channel 11). To figure out what channel your network is on: 7.1. Click the switch to stop the capture Right click the device in the Device Manager window pane Click Scan Channels In Scan each channel for: 5 seconds should be good enough.
9 Unless there are other ZigBee enabled devices in the vicinity, only one channel will show traffic. That should be your Hub Close the window and begin the capture again Right click the device in the Device Manager window pane Select Channel and choose the channel you believe your Hub is communicating on You are now ready to perform the exploit. Option 2: Atmel RZ Raven USB stick (with the KillerBee Python framework) In order for this option to work you will need a Linux system (preferably Ubuntu or Kali). The USB stick can technically be programmed with Windows, but we re not going to talk about that. If you don t currently have Linux system, you can always partition your computer and dual-boot or run the Linux system from a USB (not recommended). This method is recommended for more experienced users or users looking to perform other attacks. 1. Gathering Hardware and Software 1.1. The following hardware and software are necessary to build the toolkit: Hardware: Atmel RZ Raven USB Stick Hardware: Atmel AVR Dragon on-chip programmer Hardware: Atmel 100-mm to 50-mm JTAG standoff Adapter Hardware: 50mm male-to-male header Hardware: 10-pin (2x5) 100-mm female-to-female ribbon cable (or 10 jumpers) Hardware: USB A-Male to B-Male Hardware (optional): USB A-Male to A-Female Extension Cable Software: AVRDUDE utility
10 Software: KillerBee Firmware for the RZUSBSTICK Linux system for programming the RZ Raven USB Stick (one time operation) 1.2. All devices can be acquired from their manufacturer's website, Mouser, Digikey, or Amazon. 2. Install AVR Dragon 2.1. Open the terminal on your Linux system and type sudo apt-get install avrdude (Windows has more than 7 steps to do this). 3. Build the KillerBee RZ Raven 3.1. Connect the USB A-Male to your computer and the B-Male to the AVR Dragon Download the latest KillerBee release from here (You can use type apt-get install git on your Linux system and use git clone ) In the killerbee/firmware directory, you will find a file named kbrzusbstick-002.hex. Use this or the latest version to update the firmware on the RZUSBstick Open a terminal and change to the directory where you cloned the GitHub repository and move into the killerbee/firmware directory. 4. Build the link between the AVR Dragon and the RZ Raven As shown in the picture above: Connect the 50-mm Male-to-Male Header to the JTAG Standoff Adapter.
11 Connect one end of the Ribbon cable to the JTAG Standoff Adapter and the other to the AVR Dragon. Be sure to position the ribbon in the right direction (see picture. 5. Connect the RZ Raven to a USB port on your computer (or to the extension cable if you re afraid of snapping it off like us). A blue light will light up. Using the free end of the JTAG adapter, insert the JTAG adapter with the male-to-male header into the pins on the top of the RZ Raven, being sure that contact is being made between the header and the PCB socket. 6. Switching back to the terminal window, type the following command, but do not execute it yet: avrdude -P usb -c dragon_jtag -p usb1287 -B 10 -U flash:w:kb-rzusbstick- 002.hex 7. With contact between the AVR Dragon and the JTAG socket on the RZ Raven, run the command. You should see the following output: 7.1. avrdude: jtagmkii_initialize(): warning: OCDEN fuse not programmed, single-byte EEPROM updates not possible avrdude: AVR device initialized and ready to accept instructions Reading ################################################# 100% 0.05s avrdude: Device signature = 0x1e9782 avrdude: NOTE: FLASH memory has been specified, an erase cycle will be performed To disable this feature, specify the -D option. avrdude: erasing chip avrdude: jtagmkii_initialize(): warning: OCDEN fuse not programmed, single-byte EEPROM updates not possible avrdude: reading input file "kb-rzusbstick-001.hex" avrdude: input file kb-rzusbstick-001.hex auto detected as Intel Hex avrdude: writing flash (26778 bytes): Writing ################################################# 100% 3.44s avrdude: bytes of flash written avrdude: verifying flash memory against kb-rzusbstick-001.hex: avrdude: load data flash data from input file kb-rzusbstick-001.hex: avrdude: input file kb-rzusbstick-001.hex auto detected as Intel Hex avrdude: input file kb-rzusbstick-001.hex contains bytes avrdude: reading on-chip flash data: Reading ################################################# 100% 3.79s avrdude: verifying... avrdude: bytes of flash verified avrdude: safemode: Fuses OK avrdude done. Thank you If you ve done it right, the LED should switch to an amber LED. 8. To be able to run the suite of attacks, you ll want to configure them to your Linux PATH.
12 8.1. Type cd.. to go back to the killerbee to level folder Type sudo python setup.py install. 9. To run the capturing suites, you ll want to run these set of commands sudo apt-get install python-gtk2 python-cairo python-usb python-crypto pythonserial python-dev libgcrypt-dev 9.2. sudo apt-get install mercurial 9.3. hg clone cd scapy-com sudo python setup.py install 10. Discover the ZigBee networks within range and enumerate the network information of the devices Type sudo zbstumbler You should see information about your network printed in the commandline Now let s begin doing the real work. Begin capturing traffic and saving it to a file Type sudo zbdump -f [YOUR NETWORK CHANNEL] -w capture.dump The device should now be capturing your network traffic. Executing the Exploit 1. We will now begin adding the devices that will allow us to exploit the network. Your kit may provide with many devices, but we find the device that misbehaves the most is the light bulb that comes with the kit. When it gets kicked off the network by the user, it makes an unauthorized rejoin forcing the network decryption key to be transferred again. The other device we tested (the motion sensor) does not behave this way and requires the Hub owner to give the Hub permission to associate devices (but this is also fine). 2. Before we begin, you ll need provide the bulb with power (perhaps with that lamp we recommended). If you don t have a lamp, you can use the Motion Sensor. For that, all you need to do is remove the slip that says remove to pair when ready to pair. Remove that now. 3. If you re using the TI CC2531 and watching the Ubiqua window, you may start seeing Beacon Requests from the SmartThings device and Beacon Responses from the Hub. Nothing is connecting yet because the devices do not have permission to do so yet.
13 If you re using the RZ Raven, you won t see anything in the command-line, but all this information is being dumped into the capture.dump file we passed as an argument. 4. For the TI CC2531 (Skip to Step 5 for the RZ Raven): Before we tell the Hub to start looking for devices and capturing the traffic of that process, we will need to give Ubiqua the ZigBee Trust Center Link Key that is used to decrypt the network packet that is used to transport the personal area network key Here s the key: 5A:69:67:42:65:65:41:6C:6C:69:61:6E:63:65:30:39. Googling ZigBee Trust Center Link Key will also return the same key In Ubiqua, go to Tools > Options > Security tab > Add button 4.3. For the Type, select Application of Trust Center Link Key 4.4. Copy and Paste the Key from the step three letters above into the Key input section and click Add, then Okay. 5. We are now ready to sniff out the key with our RZ Raven or the TI CC2531 and Ubiqua set to decrypt the transport key packet when we capture it. With your device(s) still
14 beaconing, on the Things page of the application, tap Add a Thing and the app will start looking for devices. 6. Your device(s) should connect quickly and Ubiqua should show the decrypted traffic. The RZ Raven should be capturing this. 7. You should see the transported key. Click on the packet and in the Packet View window right click and click Expand All. 8. Locate the tab titled Key Descriptor. You should see the the network key used to decrypt the entire network under that tab. 9. Ubiqua should automatically decrypt the rest of the traffic for you. 10. The network is yours. 11. The next steps are for the RZ Raven: 12. Stop the capture in the terminal by pressing CTRL+C. 13. Install Wireshark Type apt-get install wireshark You ll be asked if non-sudoers should be able to capture traffic. Select yes. 14. Open Wireshark Type sudo wireshark into the command-line 15. Open the capture.dump file:
15 15.1. Select File > Open To be sure that there are no errors in decoding the file, configure the Wireshark preferences as follows:
16
17
18 In the Pre-configured Keys section click Edit Enter the Trust Center Link Key Click the + button Copy and Paste the Key into the blank Key section and hit Enter or press Ok Press OK.
19 You if you scroll down far enough you should see the key exchanged decrypted by the Transport Link Key. Click Expand All to see the key.
20 You should see it here: The network is yours.
Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created
Drone - 2 04/12/2018 Threat Model Description Threats Threat Source Risk Status Date Created Mobile Phone: Sensitive Data Leakage Smart Devices Mobile Phone: Session Hijacking Smart Devices Mobile Phone:
More informationFigure 26 CC Debugger Interface
Figure 26 CC Debugger Interface Once the CC Debugger is set up with the status indicator LED showing green, you are ready to either read or write a hex file from the board, or to start debugging a project
More informationWelcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks.
Welcome to my presentation: Message Denial and Alteration on IEEE 802.15.4 Low- Power Radio Networks. This presentation discusses the susceptibility of IEEE 802.15.4 radio networks to several different
More informationPwning KNX & ZigBee Networks
Pwning KNX & ZigBee Networks About US HuiYu Wu (Nicky) Bug Hunter Winner of GeekPwn 2015 Speaker of POC2017 http://www.droidsec.cn YuXiang Li (Xbalien) Major experience is in Mobile Security and found
More information5.1 Configure each Sensor Pin Rename Set Rules Export Data Switching Nodes... 25
Hi-Gate User Manual Hi-Gate User Manual Hi-Gate User Manual Contents 1 Introduction... 3 1.1 Hi-Gate... 3 1.1.1 What is Hi-Gate... 3 1.1.2 Specifications... 3 1.1.3 Features... 4 1.2 Hi-Node... 5 1.2.1
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationRFlasher7. Getting Started and Overview. Document version
7 Getting Started and Overview Document version 080317 Release date March 2008 Contents 1. INTRODUCTION...4 1.1 Overview...4 2. FIRST STEPS WITH RFLASHER...5 2.1 Project options...6 2.2 File loading...7
More informationYale Smart WIFI CCTV FAQs
Can I setup e-mail alerts? Yale Smart WIFI CCTV FAQs Yes, you can get email alerts. Go to main menu, select network, and then the email tab. tick enable box, set the receiver mail and the subject. Test
More informationFrequently Asked Questions WPA2 Vulnerability (KRACK)
Frequently Asked Questions WPA2 Vulnerability (KRACK) Release Date: October 20, 2017 Document version: 1.0 What is the issue? A research paper disclosed serious vulnerabilities in the WPA and WPA2 key
More informationZIGBEE EXPLOITED. The good, the bad and the ugly. Tobias Zillner August 6th Cognosec 2015 Castellezgasse 16/ Vienna, Austria
ZIGBEE EXPLOITED The good, the bad and the ugly Tobias Zillner August 6th 2015 Cognosec 2015 Castellezgasse 16/2 1020 Vienna, Austria TABLE OF CONTENTS ABSTRACT... 1 INTRODUCTION... 1 THE ZIGBEE STANDARD...
More informationInstalling + Configuring
Installing + Configuring Install and Recover with TFTP Introduction This document is designed to help you install the Commotion software if the Install on a Ubiquiti Device instructions did not work, or
More informationowncloud Android App Manual
owncloud Android App Manual Release 2.0.0 The owncloud developers December 14, 2017 CONTENTS 1 Using the owncloud Android App 1 1.1 Getting the owncloud Android App...................................
More informationMobile App Installation & Configuration
Install the mobile app on your mobile device(s) Figure 1 1. Download the AGBRIDGE Mobile app from Google Play or itunes a. Download the free mobile app onto as many mobile devices that may be used to transfer
More informationINNOV.NET PTY LTD. User guide
User guide Version1 2016 0 Contents Compatibility... 1 What s in the package?... 1 Setup the RM Pro... 1 Meaning of the LED indicators... 2 Setup e-control on your smartphone... 2 Can I program a remote
More informationBlackVue C App Manual
BlackVue C App Manual BlackVue C App Manual Contents Connecting to BLACKVUE CLOUD... 3 (A) Create an account... 3 (B) Register your dashcam with your account... 3 (C) Connect your BlackVue dashcam to a
More informationGetting Started with STK200 Dragon
Getting Started with STK200 Dragon Introduction This guide is designed to get you up and running with main software and hardware. As you work through it, there could be lots of details you do not understand,
More informationIntroduction. Package Checklist. Minimum System Requirements. Registering Your Product. More Help
Introduction Keep a watch on your family, pet, home or office 24/7, even when you re not there. Creative Live! Cam IP SmartHD gives you a live update on your phone, wherever you are. Get activity alerts,
More informationFeatures: (no need for QR Code)
The Capp-Sure series brings a revolution in surveillance. Utilising a range of high-quality IP Wireless cameras, Capp-Sure provides stunning video clarity and optional Talk-Back audio over internet via
More informationHip Smarthome - Systems User Manual
Hip Smarthome - Systems User Manual Contents 1. Hip SmartHub Connection / Setup... 3 1.1. Setup Guide... 3 2. Hip SmartTV Connection / Setup... 5 2.1. Setup Guide... 5 3. Hip SmartMusic Connection / Setup...
More informationDanalock makes your doors smart
Danalock makes your doors smart Danalock products are the intelligent way to control and manage the access to your home safely and comfortably. Simply lock and unlock your entrance or garage door with
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationNETWORK STORAGE ADAPTER USER MANUAL
NETWORK STORAGE ADAPTER USER MANUAL MODEL 522496 INT-522496-UM-0606-02 522496_man.dlrevL4C.indd 1 6/28/06 9:11:50 AM CONTENTS section page 1. Introduction... 3 2. Understanding the Network Storage Adapter...
More informationHUB FAQ Wink HUB - F W A ink HUB - F Q 1 A
FAQ Wink - FAQ 1 How do I connect my Wink to my phone? 1. Download the Wink App from the Apple App Store or Google Play and follow the in-app instructions to sign up or login. 2. Select Wink and follow
More informationTOBIAS ZILLNER ZIGBEE EXPLOITED THE GOOD, THE BAD AND THE UGLY
TOBIAS ZILLNER ZIGBEE EXPLOITED THE GOOD, THE BAD AND THE UGLY TOBIAS ZILLNER ABOUT ME Senior IS Auditor @ Cognosec in Vienna Penetration Testing, Security Audits & Consulting IoT Security Research, Playing
More informationD. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.
More informationSigma Tile Workshop Guide. This guide describes the initial configuration steps to get started with the Sigma Tile.
Sigma Tile Workshop Guide This guide describes the initial configuration steps to get started with the Sigma Tile. 1 Contents Contents... 2 Chapter 1: System Requirements... 3 Chapter 2: Configure Your
More informationStand-alone programming AVRs using CircuitPython
Stand-alone programming AVRs using CircuitPython Created by lady ada Last updated on 2018-01-25 11:53:17 PM UTC Guide Contents Guide Contents Overview Supported Chips Wiring Power Pins Data Pins Wiring
More informationSamsung SmartThins Wifi ET-WV525. Samsung SmartTings Wifi Pro ET-WV535. User Manual
Samsung SmartThins Wifi ET-WV525 Samsung SmartTings Wifi Pro ET-WV535 User Manual English (USA). 02/2018. Rev.1.0 www.samsung.com Table of Contents Getting started 3 Read me first 4 About SAMSUNG Connect
More informationHow Secured2 Uses Beyond Encryption Security to Protect Your Data
Secured2 Beyond Encryption How Secured2 Uses Beyond Encryption Security to Protect Your Data Secured2 Beyond Encryption Whitepaper Document Date: 06.21.2017 Document Classification: Website Location: Document
More informationProject 3: Network Security
CIS 331 October 3, 2017 Introduction to Networks & Security Project 3: Network Security Project 3: Network Security This project is due on Tuesday, October 17 at 10 p.m.. You must work in teams of two
More informationZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003
ZyWALL 70 Internet Security Appliance Quick Start Guide Version 3.62 December 2003 Introducing the ZyWALL The ZyWALL 70 is the ideal secure gateway for all data passing between the Internet and the LAN.
More informationPrecisionAccess Trusted Access Control
Data Sheet PrecisionAccess Trusted Access Control Defeats Cyber Attacks Credential Theft: Integrated MFA defeats credential theft. Server Exploitation: Server isolation defeats server exploitation. Compromised
More information1 Installation (briefly)
Jumpstart Linux Bo Waggoner Updated: 2014-09-15 Abstract A basic, rapid tutorial on Linux and its command line for the absolute beginner. Prerequisites: a computer on which to install, a DVD and/or USB
More informationOPEN THE HOTLINE CLIENT
OPEN THE HOTLINE CLIENT Everything in the Hotline universe starts with the Client Toolbar; it launches all of the Client s major functions. 1 Double-click the Hotline icon on your desktop. The Hotline
More informationWI-FI GARAGE DOOR CONTROLLER WITH CAMERA USER MANUAL
WI-FI GARAGE DOOR CONTROLLER WITH CAMERA USER MANUAL Contents Introduction 4 Product Features 5 Garage Door Controller LED Indicators 6 What s Included 7 Wi-Fi Requirements 8 Mobile Device Requirements
More informationWelcome to Fetch. Welcome 3. Connect Fetch to your home Wi-Fi 4. Tips to improve Wi-Fi in your home 8. Can t connect to Wi-Fi 10
Wi-Fi User Guide Welcome to Fetch Welcome 3 Connect Fetch to your home Wi-Fi 4 Tips to improve Wi-Fi in your home 8 Can t connect to Wi-Fi 10 Advanced Wi-Fi troubleshooting 1 Welcome This guide will help
More informationOmar Alrawi. Security Evaluation of Home-based IoT Deployments
Omar Alrawi Security Evaluation of Home-based IoT Deployments About Us Astrolavos Research Lab at Georgia Tech We specialize in Network Security Measurements Work is presented on behalf of my team Omar
More informationZimperium Global Threat Data
Zimperium Global Threat Report Q2-2017 700 CVEs per Year for Mobile OS 500 300 100 07 08 09 10 11 12 13 14 15 16 17 Outdated ios Outdated ANDROID 1 of 4 Devices Introduces Unnecessary Risk 1 out of 50
More informationAirstream DMX for IOS. Revision 1.1
Airstream DMX for IOS Revision 1.1 1 Contents Overview... 4 Connecting to the Airstream DMX Bridge... 5 App Navigation... 7 Fixtures Tab... 9 Patching Fixtures... 9 Custom Profiles... 11 Bridge Settings...
More informationIntroduction. Built-in speaker. Infrared lights. Camera lens. Reset button. Indicator light. Micro- USB port for power supply.
Axel USER MANUAL Contents Introduction 4 LED Indicators 5 What s Included 6 Wi-Fi Requirements 7 Mobile Device Requirements 7 Download the Momentum App 8 Pairing 9 Pairing additional Momentum Devices 11
More informationVP- X Pro & VP- X Sport
VP- X Configurator Release Notes As of version 1.6 (May 13, 2013) This document updated October 31, 2013 Contents 1. Models...1 2. Updating the VP-X Pro and Sport firmware (Automatic)...1 3. Software Upgrade
More informationCollege of Pharmacy Windows 10
College of Pharmacy Windows 10 Windows 10 is the version of Microsoft s flagship operating system that follows Windows 8; the OS was released in July 2015. Windows 10 is designed to address common criticisms
More informationTELE3119 Trusted Networks Lab 1(a),(b) Sniffing wireless traffic
TELE3119 Trusted Networks Lab 1(a),(b) Sniffing wireless traffic [10 points, Due Week 5] Part (a) Objective: The objective of this exercise is to setup an infrastructure for capturing the network traffic
More informationEmbedded/Connected Device Secure Coding. 4-Day Course Syllabus
Embedded/Connected Device Secure Coding 4-Day Course Syllabus Embedded/Connected Device Secure Coding 4-Day Course Course description Secure Programming is the last line of defense against attacks targeted
More informationGoodMeasure Connector Installation Guide
GoodMeasure Connector Installation Guide Before installation, check that you have a portable computer that you can use while on site to login to www.goodmeasure.net during the installation The Connector
More informationHomeTroller SEL Getting Started Guide
HomeTroller SEL Getting Started Guide Congratulations on your purchase! Your HomeTroller SEL is ready to put you in control of your home. Please take a few minutes to read through this guide to familiarize
More informationAditya Gupta presents: Hacking Bluetooth Low Energy for Internet of Things
Aditya Gupta (@adi1391) presents: Hacking Bluetooth Low Energy for Internet of Things About the Workshop AGENDA? + Internals of BLE + BLE Security + Interacting with BLE devices + Sniffing BLE traffic
More informationSECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi
SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question
More informationHigh Power Wireless N USB Adapter User s Manual
High Power Wireless N USB Adapter User s Manual 2 Table of Contents 1. Introduction... 4 1.1 Package Contents... 4 1.2 Features... 4 2. Installation... 5 3. Configuring the Adapter... 11 4. Wireless Utility...
More informationFile Encryption. Steven M. Bellovin https://www.cs.columbia.edu/~smb
File Encryption Steven M. Bellovin https://www.cs.columbia.edu/~smb Why Encrypt Files? Theft of files Theft of media Theft of computer Cloud storage? I.e. Someone else s computer 1 Issues with File Encryption
More informationWireless Security Algorithms
(NOTE: If you are using a virtual lab to run your attacks you will need an external Wi Fi attachment. The other option is to have a direct install on your computer. Virtual labs cannot access your wireless
More informationIf you experience issues at any point in the process, try checking our Troublshooting guide.
Follow along with this guide to set up your Omega2 for the first time. We ll first learn how to properly connect your Omega to a Dock and power it up. Then we ll connect to it to use the Setup Wizard to
More informationHow to Secure SSH with Google Two-Factor Authentication
How to Secure SSH with Google Two-Factor Authentication WELL, SINCE IT IS QUITE COMPLEX TO SET UP, WE VE DECIDED TO DEDICATE A WHOLE BLOG TO THAT PARTICULAR STEP! A few weeks ago we took a look at how
More informationDo not place or mount Ocli 1 in an area where it will be exposed to water. Ocli 1 is designed for indoor use.
1 Manual: Ocli 1 with Observeye Viewer App for Android Setting Up Ocli 1 Live Viewing with Ocli 1 Recording Video and Taking Snapshots Using Advanced Features Setting Up Ocli 1 Place or Mount the Camera
More informationGETTING STARTED GUIDE
Drop-in Networking GETTING STARTED GUIDE Drop-in Networking 90000873-88_B Digi International Inc.2007. All Rights Reserved. Digi, Digi International, the Digi logo, ConnectPort, Watchport, and XBee, are
More informationIntroduction. See page #6 for device requirements.
W-FI CAMERA USER MANUAL Contents Introduction 4 Camera LED Indicators 5 Wi-Fi Requirements 6 Mobile Device Requirements 6 Download the Momentum App 7 Create an Account 8 Setup 10 Pairing 10 Connecting
More informationParaben s Voice Logger. v User Manual
Paraben s Voice Logger v. 1.0 User Manual Contents About Paraben s Voice Logger for Windows... 3 What s New!... 3 Getting Started... 4 System Requirements... 4 How to Use Voice Logger... 4 How to Register
More informationUser Help
ginlo @work User Help 19 June 2018 Contents Get started... 5 System requirements for the ginlo @work app... 5 Recommended browsers for ginlo websites... 6 Supported languages... 6 Navigation in ginlo @work...
More informationCISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks
CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of
More informationARDF Transmitter Controller Firmware Description Manual
ARDF Transmitter Controller Firmware Description Manual Version 8x.0 Table of Contents ARDF Transmitter Controller...1 Introduction...3 Fox ID and Callsign ID...4 Code generator...4 Utility program text2code...4
More informationSEG-X3 Smart Gateway. Quick Start Guide
SEG-X3 Smart Gateway Quick Start Guide 1. Introduction The SEG-X3 Smart Gateway acts as a central platform for your smart home system. It allows you to add ZigBee devices into the system while at the same
More informationConfiguring File Server Resource Manager (FSRM)
Configuring File Server Resource Manager (FSRM) LESSON 5 70-411 EXAM OBJECTIVE Objective 2.2 Configure File Server Resource Manager (FSRM). This objective may include but is not limited to: install the
More informationFix Home Network. Thousands of satisfied users! Easy steps to setup Wireless router with Cable or DSL internet service provider.
Fix Home Network Thousands of satisfied users! Easy steps to setup Wireless router with Cable or DSL internet service provider. Copyright, Legal Notice and Disclaimer: This publication is protected under
More informationSecure Communications Over a Network
Secure Communications Over a Network Course: MITS:5400G Proffessor: Dr. Xiaodong Lin By: Geoff Vaughan 100309160 March 20th 2012 Abstract The purpose of this experiment is to transmit an encrypted message
More informationINNOV.NET PTY LTD. User guide
User guide 0 Contents Compatibility... 1 What s in the package?... 1 Add device... 2 Legend... 2 Meaning of the LED indicators... 2 Setup the RM Mini 3... 3 Setup e-control on your smartphone... 3 How
More informationBlackVue App Manual. Contents
BlackVue App Manual Contents Connecting to BLACKVUE CLOUD... 3 (A) Create an account... 3 (B) Register your dashcam with your account... 3 (C) Connect your BlackVue dashcam to a Wi-Fi hotspot for Cloud
More informationUsing Network Analyzer Tool to Monitor Bluetooth Mesh Traffic
Using Network Analyzer Tool to Monitor Bluetooth Mesh Traffic KEY FEATURES This training demonstrates the usage of the Network Analyzer tool provided by Silicon Labs, and applies it to monitor Bluetooth
More informationSMART WI-FI CAMERA START GUIDE
SMART WI-FI CAMERA START GUIDE Thank you for purchasing your MERKURY smart home product. Get started using your new devices by downloading Geeni, one convenient app that manages everything straight from
More informationSophos Mobile Security
Help Product Version: 8.5 Contents About Sophos Mobile Security...1 Dashboard... 2 Scanner... 3 Web Filtering... 4 App Protection...5 Call Blocking...6 Loss & Theft...7 Configure Loss & Theft... 8 Wi-Fi
More informationCreating a Yubikey MFA Service in AWS
Amazon AWS is a cloud based development environment with a goal to provide many options to companies wishing to leverage the power and convenience of cloud computing within their organisation. In 2013
More informationM32 Development Board
M32 Development Board User Guide Document Control Information This Document Release Date: 12th March 2006 This Document Version: 1.0 Document History Author Release Date Reference Release Notes JSL 23rd
More informationBluetooth Lock Boxes User Guide
Bluetooth Lock Boxes User Guide BATTERY Q: What type of battery is used in a Master Lock Bluetooth Lock Box? A: Master Lock Bluetooth Lock Boxes come installed with a C123A lithium battery. For optimal
More informationDual Serial Shield User Manual
Dual Serial Shield User Manual PN: 2050 Berkshire Products, Inc. Phone: 770-271-0088 http://www.bkp-store.com/ Rev: 1.00 Copyright 2013 Table of Contents 1 Introduction... 2 1.1 XB compatibility... 2 2
More informationAtmel Trusted Platform Module June, 2014
Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four
More informationToucan Surveillance Kit Camera & Smart Socket. User s Manual Model: TSK100KU
Toucan Surveillance Kit Camera & Smart Socket User s Manual Model: TSK100KU Table of Contents 1. Key Features... 3 2. What Is Included... 6 3. Toucan Camera & Socket Installation... 8 4. Getting The Kuna
More informationWL-5420AP. User s Guide
WL-5420AP User s Guide Table of contents INTRODUCTION... 1 About the Operation Modes...2 LED Indicators...5 Solid...5 Ports on the Rear Panel...7 GETTING CONNECTED... 8 WPA AP -CONFIGURATION VIA WEB...
More informationiminicam 1080p Wireless Spy Camera User Manual
iminicam 1080p Wireless Spy Camera User Manual imini Spy Camera User Manual Introduction Thank you for choosing the imini Spy Camera. Experience cutting edge technology and enjoy the security that the
More informationOutline More Security Protocols CS 239 Computer Security February 6, 2006
Outline More Security Protocols CS 239 Computer Security February 6, 2006 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication
More informationHOME SECURITY KIT. USER MANUAL SMART PROTECTION WITH THE ALL-IN-ONE SOLUTION. SMART WINDOW SENSOR SMART POWER SOCKET SMART MOTION SENSOR SMART IP CAM
HOME SECURITY KIT. SMART PROTECTION WITH THE ALL-IN-ONE SOLUTION. SMART WINDOW SENSOR SMART POWER SOCKET SMART IP CAM SMART MOTION SENSOR USER MANUAL SL-900100/900111 HOME SECURITY KIT A/B SHORT INSTRUCTION
More informationPost Connection Attacks
Post Connection Attacks All the attacks we carried out in the previous sections can be done without knowing the key to the AP, ie: without connecting to the target network. We saw how we can control all
More informationAmcrest 650 TVL DVR Quick Start Guide
Amcrest 650 TVL DVR Quick Start Guide Version 1.0.2 Revised May 9 th, 2016 Welcome Thank you for purchasing our Amcrest 650 TVL DVR! This quick start guide will help you become familiar with our DVR in
More informationSEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security
SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security Consider 2. Based on DNS, identified the IP address of www.cuhk.edu.hk is 137.189.11.73. 1. Go to http://www.cuhk.edu.hk 3. Forward the
More informationCtdigi.com. Instruction manual. Production by S & W Technology Labs
Ctdigi.com Instruction manual Production by S & W Technology Labs I. Install app II. Guard camera Guard camera Introduction Accessory Sensor Scenario Guard 360 Introduction - Catalog - Install app Scenario
More informationHacking challenge: steal a car!
Hacking challenge: steal a car! Your "local partner in crime" Sławomir Jasek IT security expert since 2005, and still loves this job Agenda BLE vs security How to hack the car New tool Vulnerabilities
More informationFrequently Asked Questions 60W Replacement A19 Connected Cree LED Bulb with 4Flow Filament Design
Frequently Asked Questions 60W Replacement A19 Connected Cree LED Bulb with 4Flow Filament Design 1. What is the Connected Cree LED bulb? The Connected Cree LED bulb combines the great features of the
More informationOptec WiFi Board
Optec WiFi 802.11 Board Installation Instructions for the Optec 802.11b/g Wireless Board. The Optec Wireless Networking Board (WiFi) is an optional accessory for the FocusLynx and Gemini control hubs.
More informationDEEP ARMOR. Hands-on Exploitation & Hardening of Wearable and IoT Platforms. Sumanth Naropanth & Sunil Kumar
DEEP ARMOR Hands-on Exploitation & Hardening of Wearable and IoT Platforms Sumanth Naropanth & Sunil Kumar Agenda Technical overview of an IoT/wearable ecosystem Building blocks Communication Protocols
More informationKvaser BlackBird Getting Started Guide
Kvaser BlackBird Getting Started Guide Copyright 2007-2018 Kvaser AB, Mölndal, Sweden http://www.kvaser.com Printed Sunday 16 th September, 2018 We believe that the information contained herein was accurate
More informationSecurity Philosophy. Humans have difficulty understanding risk
Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy
More informationMagnetic base Indicator light Microphone Camera lens Micro SD card slot Infrared light Front Side Pivot connector Built-in speakers
Niro USER MANUAL Contents Introduction 4 Product Features 5 Niro LED Indicators 6 What s Included 7 Wi-Fi Requirements 8 Mobile Device Requirements 8 Garage Door Opener Requirements 8 Download the Momentum
More informationIT 341 Introduction to System Administration Project I Installing Ubuntu Server on a Virtual Machine
IT 341 Introduction to System Administration Project I Installing Ubuntu Server on a Virtual Machine Here we create a new virtual machine and install Ubuntu 16.04 LTS Server on it. In this instance, we
More informationInstallation. Manual
Installation Manual Thank you for purchasing Nexx Garage! Installation will be quick and easy and should take about 30 minutes to complete. For additional installation instructions, please visit our website
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationAmcrest 960H DVR Quick Start Guide
Amcrest 960H DVR Quick Start Guide Version 2.0.2 Revised July 22, 2015 Welcome Thank you for purchasing our Amcrest 960H DVR! This quick start guide will help you become familiar with our DVR in a very
More informationCryptographic Checksums
Cryptographic Checksums Mathematical function to generate a set of k bits from a set of n bits (where k n). k is smaller then n except in unusual circumstances Example: ASCII parity bit ASCII has 7 bits;
More informationIT Essentials v6.0 Windows 10 Software Labs
IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows
More information...high-performance imaging data and video over Ethernet
Quick Start Guide ...high-performance imaging data and video over Ethernet Ver 2.4 Item number: 222A000000002 Product code: PT1000DOC-QSG The products are not intended for use in life support appliances,
More informationHow to Build a Culture of Security
How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your
More informationThe manufacturer has released new improved firmware which upgrades your O2 USB Modem. To install it follow the instructions below.
O2 USB Modem Firmware Upgrade. The manufacturer has released new improved firmware which upgrades your O2 USB Modem. To install it follow the instructions below. The upgrade will work on Microsoft Windows
More informationCongratulations on the purchase of your new Clover Mobile
Congratulations on the purchase of your new Clover Mobile Set Up the Hardware What s included Optional Accessories USB wall charger USB cable Clover Mobile Dock Clover Mobile Printer Clover Mobile Clover
More information