33c3 preroll music Herald: Ray, are you ready? Ray: I think I’m ready! Herald: Alright he’s ready… Let me introduce you, Ray! “Lockpicking in the IoT”, or “Why adding a Bluetooth Low Energy device sometimes isn’t a great idea”. Here we go! applause Ray: Okay, so, welcome everybody to “Lockpicking in the IoT”, or the internet of things that were never supposed to be on the internet. Okay. There’s a small overview of what we’re doing. I’ll introduce a little bit what is this about, show you some hardware porn – for the hardware lovers among you – then look a bit deeper in the PCBs of that hardware – for the electronics guys – then we look into communication on the internet – this is this modern thing everybody wants to have in his coffee machine – and then we go for the wireless interface, and see how difficult or not difficult it is to attack them. And last but not least we will look into Android app hacking – I have to say I’m mainly focusing on Android but I’m pretty sure if you’re more the Apple guy there’s similar techniques available to go for your Apple app. But for most devices there’s both – so even if you’re using iOS you can hack the Android app to get the infos. And then the talk is over. Okay. The very important thing first: the disclaimer. Basically I want to say I just tested this on my locks, I don’t say it’s working on everything, I don’t say it’s a general mistake by somebody, might have changed, I might be wrong, I just show my research. Okay. This is basically what we’re talking about. We have some kind of smart or not-so-smart device which is talking over Bluetooth Low Energy to your smart, or not-so-smart phone. Which is usually talking, using TLS and HTTP to the ‘Cloud’. So it’s not just locks. The talk is called “Lockpicking” because that’s the thing we’re actually going to attack. But the techniques here shown work for basically all of these Bluetooth Low Energy devices. There are e.g. different light bulbs. I found some interesting reports on light bulbs that don’t use any form of authentication. So you can connect to your neighbor’s light bulb and change a color, or turn it on or off. So, finally, Blinkenlights in your neighborhood! mumbles and laughter Then of course there’s cars. Everybody’s talking about cars today. I just heard a talk about cars. They’re not really using Bluetooth Low Energy. But still they use an app and are controlled over the internet, so, it’s kind of on-topic. Then there’s vibrators. I mean, unsafer cyber sex never has been easier. Actually I don’t have one of those, so, if anybody has, please bring one over to play with it. But I’m pretty sure they have high-class security. laughter And then there’s button pushers. I just learned of that yesterday and I thought “WTF, a button pusher!?” laughter applause This is a Bluetooth Low Energy device which you can communicate to and make it press a button. Here it’s pressing the Delete key on my notebook. So finally I have a Bluetooth LE enabled Delete key on my notebook. laughter Very, very helpful. Of course, if you add that to your door opener at home you can do it again – lockpicking. We haven’t hacked that yet because I just saw it yesterday but it didn’t look very encrypted. It has some secret, some shared string, we didn’t understand. But possibly this congress we will look into it. Okay, then there’s cars. I’m not sure, who read this message that Tesla had a big app hack? Nobody? Oh. I thought, everybody read it because it even was on Heise. And it obviously is a very big vulnerability, Elon Musk has to get better on this and everybody’s stealing these things… how are they called… oh yeah, these ‘smart cars’. And they even have colors! So who wouldn’t want to steal one of those? laughter The bad news is actually that wasn’t really a hack. What they showed is that the app is able to start the car. That’s in the manual. So what they told is: “Yeah, but if I hack your phone I can start your car!” Then they realized, “Oh, you also need the password because for starting the car the app actually asks for the password again.” – “Yeah but if I hack your phone I can install a fake app that asks for the password; and if you enter it I can steal your car!” – Oh, surprise! laughter I mean this is not the kind of hacking we’re talking about. And they then suggested the app should be more protected against reverse engineering. What would that change in this aspect? I can create a fake app without even decompiling the original one. So, of course if you don’t have security on your phone working, if you install apps that are not secure your data is not secure, and your Teslas get stolen. But I didn’t see anything in this ‘hack’ actually being a hack. So, while talking about… applause Spare your applause for this one! Talking about obfuscation. That’s really a thing some people understand differently than I do. I try to say [to] people: “security by obscurity does not work!” So if you obfuscate your app, possibly it slows down researchers like us. But the people doing that for money, who want to sell exploits, they will still put the energy into it. And sell their exploits even more expensive. And the exploit will even be longer out there because the independent researchers won’t find the vulnerabilities that fast. The idea is: good crypto does not have to be secret to be secure. So, no, please don’t obfuscate your apps better. Build your protocols better. But as said before I didn’t see any aspects there in Tesla. Possibly they should make it obvious that you can start the car with it and make it ‘disableable’, and what… things like that, but it’s not a security issue. Okay. So let’s go back to locks. Because, actually the talk is called “Lockpicking”. So what do these smart locks usually do? Of course they can be opened. Usually your… with your phone near your lock you put something on the lock and communicate – the lock opens. Optionally you have to press something on the phone, so it’s a 2-step process to unlock, which is actually a quite good idea because of some obvious scenarios which will work otherwise. Then – and this is different from normal locks – they can be shared to friends. It’s a big feature. They try to convince you why these smart locks are so smart. When I’m not at home I can send somebody the code, and give him the possibility to open my bike shed for just one hour. Because I can, of course, revoke that at time restrictions. So that’s what the big advantage is, compared to a traditional lock. Except, of course, it’s to be much more secure because you can’t pick it anymore. And then those obviously have some failsafe mode in case your phone breaks and whatever. You can enter a click code, and can enter a code by some buttons or something to open it without the phone. But that is nothing we’re going to look into today. So from these basic ideas, of course, there come some basic attack vectors. What I could try to do: I could try to bypass the sharing restrictions. So possibly go in a different time window. I could change the time on my phone, probably. Would that work? Things like that. Open the lock after it was revoked. Of course then that’s what everybody thinks about when talking about Bluetooth: I could try to get the keys. From sniffing somebody’s Bluetooth LE connection. That’s something we’re going to do today. Then this is what I was talking about why the ‘2-button-press’ is a good idea. You could relay opening codes. If you have the ‘instant-open’ feature I could approach you, pretend to be your lock, your phone sends me an OPEN command, I could relay it to your lock, completely somewhere else, and it would open. So I think this is something you can’t really stop except with some very tricky mechanisms. Possibly ‘timing’ or some… things like that. So this ‘instant open’ feature is possibly not the best idea. Then we have the option to attack the lock or app software directly. I mean, it’s software. So it will have buffer overflows. It might have other weaknesses. It could just do not verify some things. If I tell I’m another person - does it really check if I have the rights, and everything? But this is something – I think the only thing – I don’t have in this talk today. Because the other methods worked already. Okay. Going to look at the hardware. So, basically, if you’re a lockpicker or some other reverse- engineer, if you get a new hardware you want to take it apart. If you can’t take it apart, you can’t open it you don’t own it. And here’s – if you want to do it yourself – these tips how to open it. The NOKE is very nicely built. When you have legally or legitimately unlocked your NOKE you can disassemble it without doing any damage to it. [You] just need a screw driver and it completely comes apart. Very nice design. The Master Lock – you have to drill out 4 rivets. This is a bit sad because after that it won’t be a very good lock anymore. But it’s not a problem because it isn’t before, from my experience. applause and some laughter And then there’s the Dog & Bone lock, which is a lock I just got recently. Its a little bit tricky to open but you don’t have to do a lot of damage. If you have it opened you can pull out a pin in the back – thank Jan (?) for finding that out. And then you can remove screws and it really comes apart nicely. So how do these locks look, now? This is the NOKE. So basically you see a PCB, you see a normal lock body like here, with a shackle. There’s a motor at the PCB. The motor turns some locking element in here. And if it’s in the right position the lock opens. For the NOKE there’s a very nice paper by the SSDeV member Michael Hübler. I have a link at the end of the presentation. And neither he nor me did find any mechanical bypasses for that lock. So the mechanics look okay. Then there’s the Master Lock. It is very similar, but I have to say they invented this mechanism with the motor in this locking element first. It has 4 buttons on the PCB which you can use to enter a code. Has 2 CPUs, pretty standard design. And here are the rivets you have to drill out to make it open. The Dog & Bone is a little bit more clumsy. It’s a bigger lock. It comes apart in quite some pieces. What I really liked was that motor with that gear box. I think it’s like 1:2000 or something. So it really gets a lot of power from the very small motor. So what does it do with it? It turns this element, and this element retracts these 2 spring loaded locking elements which are locking the shackle. If you’re a lockpicker you will ask: “Spring loaded? Seriously? Have you ever heard about the term ‘Shimming a lock’?” ‘Shimming a lock’ is inserting some metal at the shackle, and pushing back the springs. It’s a very standard method for padlocks in the 5 Dollar range, I would say. Locks starting at 10..15 Dollars or Euros or whatever, in that area usually can’t be shimmed anymore. When I opened the Dog & Bone lock I instantly realized: it’s spring loaded, it is shimmable. A short search on Google found out that Mr. Locksmith, a lockpicker from the U.S. who does some good Youtube videos, found [that] out months before. And of course, it’s shimmable! You put in some thin metal sheets – he built them from a cutaway of a soda can, puts them in and the lock opens. But this is not a 5 Dollar lock. This is an 80..100 Dollar Bluetooth padlock. And you shim it with cut metal. Okay. No need to go into the Bluetooth Low Energy for that one. laughter And, as a small teaser: I also didn’t say there’s no mechanical bypass for the Master Locks. But we’ll come back to that. Okay. The electronics. This is the electronics of the NOKE. Basically you see there’s one CPU, and something that’s called an ‘H bridge’ which is used to control a motor. All the rest is pretty standard electronics, so, very simple design. The Master Lock has 2 CPUs, has the buttons on the PCB, also quite simple electronics. And this is the MCUs. The interesting thing I see is there’s a very common chip. It’s the Nordic nRF51822. I find it basically everywhere. It’s in light bulbs, it’s in 3 of the locks I have here. Or 4, if you count the Ivation and Nathlock [not] as the same. Only the Master Lock uses MSP430, which is… The nRF is a… basically ARM core. The MSP430 is a much smaller chip, it’s from Texas Instruments, and it’s a very low power consumption chip. It was also used in the previous non-Bluetooth LE electronic lock. But it’s basically also a normal microcontroller, and you can program it. So, program it. That means you can just use any ARM Flash board. I used the ST-Link interface from an STM32 dev board we had in our hackerspace. And interfaced it to the chip of the NOKE padlock here. So e.g. using OpenOCD, but… there are different tool chains (?) but this is one where you find some info on the internet, how to use it with the nRF. Using OpenOCD you get an interface to connect to the chip, and then you can issue commands like ‘Probe the Flash in it’; you could read the Flash, you could write a new firmware to it, and stuff like that. With the old Master dialSpeed padlock which is pre-Bluetooth-LE but already electronic, a few years ago, I think 4 years ago we presented about that one, that was not read protected, you could change the firmware, you could actually get the codes from reading the flash, and you could access the Flash content without opening the lock. So that was really funny. Not usable as a lock, but I re-flashed it to a Simon Says style game where you have to repeat the sequence it shows you. Funny lock for your hackerspace. Unfortunately, or fortunately… No, I would say ‘unfortunately’, the NOKE firmware was read protected. Because there’s no need for it. The NOKE firmware Flash ports can’t be accessed without opening the lock. So you don’t lock somebody out by read protecting it, except for the legitimate owner. But okay, it was read protected, and I was saying: “Oh, decompiling firmware, that’s hard work anyway, let’s skip that one.” But of course you could use these flash interfaces to write own firmwares to these locks. Possibly make them open source one day. Or do something else. Or just use them as cool dev boards. With some actors on it. So, let’s go for the first interesting thing, I would say. The communication with the ‘Cloud’. So your phone speaks to some servers which is provided by the vendor of your hardware usually. And it’s usually a TLS encrypted link using HTTP. Over this link the application on your phone sends login data, gets back from the cloud the information about the lock. So you can install your app on a new phone, enter your login credentials and instantly use all your locks. Or the locks that were shared to you. Usually these apps also send events to the cloud, when you open your locks. So if you share the lock with someone you can see on your other phone that he opened it, and possibly where he opened it. And things like that. And of course also data is edited, if you add a new code to it or something. So this is sent over the link. So, some people would say: “Oh, but TLS encryption is secure, isn’t it?” Of course, usually it is. There are flaws which you hear about from time to time at these conferences. But that’s not the problem here. The problem is – but it’s not a problem, it’s nice for us researchers – you own the phone with the app. You control the app. You can even modify the app. But owning the phone you control the TLS trust store, with the certificate authorities. So you can install a new CA and trust your own servers. People could try to prevent this using key pinning in the app. But, again, you also control the app. You can change the app, you can remove the key pinning. So, basically, breaking into this TLS is something the vendor has to expect. It’s your device, it’s your communication. You can listen to it. So, and the nice thing – and this is what I’m trying to tell all of you here in this talk – these things are not difficult. There are nice available tools; and if you have some apps which do some things you want to know – install such a tool, watch your app doing transferring data, and look what your apps actually communicate. Actually it’s quite interesting to see what your phone communicates to Google all the time. I realized it: one of these apps is telling Facebook when I started, every time. What the Fuck?? But you easily see it. What you do is you install e.g. mitmproxy, it’s a small hell of Python dependencies, but it’s usually installable on a Linux, and even on a Mac machine. Haven’t tried it on Windows but I’m pretty sure there’s options for that. And you install it as a web proxy, so, you change the internet connection of your phone, and say: “Oh, this Wi-Fi has to use a proxy, enter the IP of your proxy…” And mitmproxy creates fake certificates on the fly. So whatever side you access it creates a new certificate looking the same, signs it with the fake CA, and you can install the fake CA just by going to http://mitm.it/ So, man-in-the-middle it. And there’s a link to install a fake CA on your phone. So that’s actually really [done] in, like, 5..10 minutes, with compiling of the Python stuff 15 minutes, and you have a working man-in-the-middle setup and can watch your communication. This is what the app looks like. So we see here a few POST requests to the NOKE app. We get replies; actually we see funny 403’s here. I’m not sure why it’s doing that. But okay. But this is what the NOKE app does on startup. And of course we can not just see the requests, we can look into the request itself. And it’s e.g. a good way to recover your password. Possibly I should have blurred it here. So if you have forgotten your password you just sniff your communication. It also works for your Play Store password, usually. Usually they use a token but some time it’s renewed. So every app that has a password and sends it to the cloud – you can recover it with that. And from this login you get data back. And in the NOKE app it’s usually done like I send login, with user and password, and I get a token back. And then all following your request I just have to send this token, and then I’m authenticated. So that’s an okay mechanism I would say. So. What do we get also? We have a GETLOCKS key, and when we call ‘getlocks’ we get the information about our locks. So this basically is an ID of the lock. This is a lock key. There’s something to remember: 0137 – we’ll see that later. You see the MAC of the lock, you see a picture URL where the application shows me the lock – if I have multiple locks I can assign different pictures to it. And this is a quick open code where I can push on the shackle to open this lock. So this is all no hacking because this data I’m supposed to know. It’s my lock, I can know the information, then it’s not a big problem. But it’s interesting to see what it’s doing to understand how it’s working. Then we have the next thing, the ‘shared locks’. This is more interesting, possibly because I see: “Oh, I’m allowed to use it all day, starting at that day, starting at that time, ending at that date, at that time”. And this lock has a key, and there’s another key. And another MAC. So, the nice thing is, the lock does not have a time. The lock does not know when I’m allowed to open it. So all I need is this key. And the nice thing also is I don’t have to manipulate the app in any way. I can use Mitmproxy to change the data on the fly. So I just tell Mitmproxy, please change 2016 to 2066, then the reply comes back, and then the NOKE app thinks “Oh, he’s still allowed to use that”. Of course the NOKE people were clever and do an online check. Which actually means you can only unlock a lock if you have a shared lock. Your own lock you can use offline. But a shared lock you can only use when you have internet. Not good if it’s the cellar or something. But it does an online check, it asks: “Can unlock?” and the cloud answers: “Yes, success, can unlock”. Of course I can also fake that! So this is completely bogus; it’s unnecessary to be online. I could do it offline. If I want to hack the lock I can do it in the cellar. Only the legitimate user has to be online. So the sharing feature of the NOKE already is broken just with the Mitmproxy tool. Really, that’s not big hacking. They could have thought about that. But okay. So, once somebody shares a lock to you, a NOKE to you, you have this key and you can use this key from then forever on. Using the original app. That’s the nice thing. You don’t have to change it. One thing which is positive about the architecture here, the key that they use for sharing is a different key than you have to operate your lock. That means with this sharing key I can not modify the lock. I can’t re-key it, or change the click code, or things like that. So I just can open it. And they have an option to change the key of the lock. So I can go to my lock and say “Re-key!”, and the they do a new key. But for that I have to go to my lock. So that’s nothing if I share the lock to you from Congress, and the lock is somewhere in… Salzburg! Then that doesn’t work. So not really helping. Possibly one time keys or something like that would be a better option, or just some challenge/response mechanism. If you have to be online, why not. But that’s something for the future. Currently lock sharing is not very secure, and I would advise you to keep that in mind when you use the Sharing feature. Oh, regarding dumping firmware: as I said before a firmware was not dumpable from the NOKE. The Dog & Bone I didn’t even try to dump the firmware because it was shimmable. But they sent me an URL in the CONNECT where I can download the firmware. And if you… laughs laughter and applause Again, I don’t consider this a vulnerability. I think if I own the lock I should be allowed to read the firmware. If you download that it’s an actual hex dump of the firmware. It looks like directly what you would flash on the chip. So if you want to do some firmware reverse engineering that’s a very easy starting point to get the firmware from the internet, disassemble it, play with it, flash it possibly to your own dev board without even owning the lock, to play with it. Why not. Okay, so, so much for the app communication. You can do quite a lot with it already. But we want to go a little deeper. We want to go for the Bluetooth Low Energy level. So the communication between my phone and my lock. Or my vibrator. Or whatever. So Bluetooth Low Energy is newer, but actually easier to sniff than Bluetooth. There’s a talk called “With Low Energy comes Low Security” if you want to have an introduction to that. You find it on Youtube. Basically, it has 3 security modes. But the most common used are NON and ADHOC which is like almost none security. And the third one would be pairing with a code which is usually a 6-digit number. If you listen to that pairing you also own everything. This improved with Bluetooth Low Energy 4.2, or Bluetooth 4.2 which includes a new Low Energy standard. But this is not implemented very commonly today, and won’t be in the very near future. Because not so many devices support it. So for now Bluetooth Low Energy is an easy target to get into research. There’s available tools for it like the Ubertooth One by Mike Ossmann. The Adafruit BTLE sniffer for… very cheap. And you can build your own one by flashing a firmware available from Nordic directly to any dev board with this chip you have. So this is the hackerspace entry point. If you have this stuff lying around… Otherwise I would recommend going for the Adafruit Sniffer. It’s orderable even in Europe, very easily. So not a big problem. But the very cheap option is: get a 3..5 Euros dev board like this from China, use your STM32 programmer. I have another board here which is a serial interface. But you could use your normal FTDI USB-to-Serial, also. And then this board is identical to the Adafruit Bluetooth LE Sniffer, for like 5 bucks. Okay. Talking about this research. This is nothing nobody did before. Somebody like e.g. Rose & Ramsey did it at DEF CON and presented quite a nice talk where he analyzed a lot of locks. He had like 15 locks of it, and 12 of them broken. So it was really plain text passwords on the Bluetooth LE, for the Quicklock, iBluLock, Plantraco Phantomlock. I hope that’s correct. I don’t claim that to be true. But he told [it] in the talk. He found replay attacks on these locks. So you can just resend the same code that you saw before, even without understanding it. But he stopped where it became interesting. And instead of that posted this slide. Which I hate. He wrote about uncracked locks. And the first one was the NOKE padlock. And for the time line: at that point I already had disclosed to NOKE our findings. Which you will see today. So the NOKE company knew about the lock being completely broken on the crypto layer [at that time]. But they see this talk by Rose & Ramsey and post a blog post: “NOKE just one of the few Bluetooth locks to pass hacker testing”… SERIOUSLY?? They were notified! And they… we had active communication about them changing the crypto protocol. Possibly the social network people are not so close with the technical people. But okay. So, let’s crack it. Using the Nordic Bluetooth LE sniffer firmware, which is… unfortunately the easiest way to use is on Windows. But you can use it with Python also on Linux. And Wireshark integration isn’t that nice… So if you have a Windows, or Windows VM it’s the more easy entry point. Here you have a text interface where you say: “I want to sniff to this device”, then you get a lot of lot of lot of packets here. Mostly ‘discovery, discovery, discovery’. You have to look for the bigger packets. This was a bigger packet with some payload, and it contains a very long string which looks completely random. So I see from phone to NOKE there’s random; from NOKE to phone there’s random. Looks actually encrypted. And NOKE is claiming they are using AES128. So I didn’t even try to understand what I see here because if it’s AES encrypted you won’t find any meaning in it. So let’s put the sniffing aside for a moment. We can’t sniff to the data. We can get this communication off the air. But for the NOKE we can’t do anything with that. So let’s go for app hacking. There are different approaches. One – the easiest… not the easiest but the first one we did – is manipulating the apps. So you can get an APK from your phone very easily with ADB. You don’t have to have a rooted device for that. You can just enable Devel mode and copy the APK over. There’s lots of tutorials on the internet how to do it. It’s basically 3 calls on the shell. And those APKs can easily be disassembled with a tool like SMALI. You can change things in it, like a URL. You can change values. Then you can re-assemble it, self-sign it, and put it again on your phone. One thing you can do with that is change the app to use a different URL for its communication. And that’s actually quite a nice idea. Because we saw before we can completely understand this protocol. It’s not a complicated protocol. It’s sending some requests, and it’s getting some JSON responses. I can write this in a Python script with a few 100 lines, and fake their server. So I actually could run my NOKE lock – if it would be having good crypto, but okay – on my own server. Not connected to their cloud, but build my own NOKE app and have it communicate with my NOKE server. Why not. Possibly in the far future NOKE doesn’t exist anymore, who knows? It happened before to other companies: the servers are gone – your hardware is gone. If you understand the protocol, if you have sniffed it before you can reimplement it and continue using your hardware. Except for that I wouldn’t like to have my locks in the cloud! We actually used this method during the analysis of the NOKE lock to change a random number generator in the app to always return ‘42’. Thanks to Sec for that one. He did a binary patch on the MIPS binary on it. We just put it in and had a nice random number to spot it easier on the communication. The other thing is you can decompile these app APKs. You get it, again with ADB. Run it through a decompiler like Jadx which you can install on your PC. You can download it from Github. Or if you just want an easy decompile you go to an online decompilation service. They say: “Please only use it for legitimate purposes”, but we do! And yesterday Sec was very annoyed by the Adblocker blocker they have. But if you ignore that then it’s very easy to just upload an APK, get back the source code. And then, basically, you have Java source which you can read, you can search, you can grep… Oh! You can grep. So. We were looking for AES! laughter applause Yeah, everybody is laughing at that slide. But there’s 2 things to mention. First of all this is not all of our research. This is just the beginning. Then it became difficult. The other thing is this key of course is very silly. They actually use 01 to 15 as an AES encryption key. But if they would have used a real random pre-shared key I still would have found it that way. So, actually, it’s not really less secure. It’s just possibly left over from development. I have no idea why you would use that key! But still – even a better key, I would have found it in the source code. Because it’s a pre-shared key. The lock knows it. The app knows it – has to know it because it’s pre-shared. So, yeah… But still it’s very funny that they have this silly key in there. And we were actually wondering quite a lot: “Oh, but what blockchaining mode do they use? How do they use AES? Is there an initialization vector?”. I don’t know. Took us quite a while until we realized: it’s simply just one block! If we use that thing that we sniffed earlier and just run one AES decryption with the key 0001 etc. we get something which includes our 42 numbers. Oh! Our ‘random’ numbers turn up! How are the chances for that? No. So, actually this key decrypted the thing we got from the wire. So we thought: “Success!” and NOKE is cracked! Unfortunately it only worked for the first 2 messages, and all we saw in these 2 messages is our ‘random’ number, and in the answer another obviously real random number, because we didn’t patch the lock. The next messages from that on again were completely scrambled. So we had to do some more reverse-engineering. Unfortunately, or fortunately – to make it a little more interesting for us – this APK from NOKE doesn’t only include the Java source. It has some shared object files. So, binaries, which are compiled with some other compiler, probably C. Luckily those were in there for Android, for multiple architectures. And one of those – I don’t know who is using Android on x86, but obviously it exists – so we had all the libraries also in x86. Which we could run through a commonly available disassembler. I started doing this object dump, and things (?) a little bit. But it’s really hard to read, and you don’t come so far with it. So, big thanks again to Sec and to e7p who helped me a lot during Easterhegg this year, which was a quite nice event, where we did some lock hacking. And they were staring with me at IDA Pro dumps all the time to find the key exchange, and finally, it worked out. So, all the assembler is very hard to read, I think. But we see there’s a parseCmd function we found. Actually they had the labels in there! Which again is not the vulnerability, it just made it easier for us to spot the stuff. I don’t think that’s bad from them. It’s okay. So we found this parseCmd. It actually calls an AES decrypt function. It gets a little bigger and bigger and bigger. There we find – I actually can’t read it from here very good – this was the Create Session key. This sounds very promising. It was called ‘CreateSessionKey’. Hm. Might have something to do with the things we saw before. And it has this in a loop. And this loop is actually something people could understand if they can read some x86 assembler. It’s a loop of 4 iterations. And it’s XORing values from one array to another. So it’s basically XORing 4 values. And this is the core component of the key exchange. This is the 4 byte numbers that we saw earlier. My 42 42 42 42… and the other one coming from the lock, are XORed together, and then there’s some more magic done. So basically the app sends a random number to the lock, the lock sends a random number to the app. And from that there’s a session key calculated by adding XOR of these 2 numbers to the middle of the original key. So you have this original key which we saw before. And you add this result onto it. So. We saw from the app our 42 44 42. Of course if you have the real app running that would be still real random. But this doesn’t make a difference. It just was easier for us to see it’s the same every time, so… It helped a little bit, but not too much. So the lock sends the key, those 2 values are XORed together; and then they are added onto this silly pre-shared key. I don’t know why they’re doing that! I mean, they could have at least added it to different parts of it, and they would have more entropy in it, or… I’m not sure who sits in the cell and does some coding, and thinks: “This is a good key exchange!”? You can’t really look into these minds. But okay, so, we can do something in our head. We see here is 0xFD, we add 0x05 to it. So it rolls over. This is why here’s the Modulo operation. And get the 0x02. We have 0xBB here. We add 0x06 to 0xBB. If you can calculate hex you see it comes to 0xC1. Etc. So everything that changed in the key is the middle 4 bytes. Which is actually another vulnerability. Because it means even if for some reason, which I really can’t imagine because this exchange is done everytime you open your lock. It’s not something done on the first time or done once per phone or something. Everytime somebody opens this NOKE this whole sequence is run through. It connects to the lock, sends a random number, receives a random number, the session key is calculated, and using the new session key the rest of the communication is done. But just in case you did miss the first packets for some reason: if you have a real attack scenario where you can’t replay it it might happen that it’s scrambled. Then it’s still 4 bytes changed in the key, so we can brute-force the new key. By knowing the old one and brute-forcing those 4 bytes. So I think that’s doable on a modern machine without bigger problem. So really, not the cleverest key exchange. But even if it would be better it wouldn’t really help. Because there’s no asymmetric crypto in it, there’s nothing preventing us from following it. If you exchange a session key over a pre-shared secret, somebody knowing the pre-shared secret will always be able to follow it. So, they have to do some big changes there to make it proof against sniffing. We have this new session key and of course we have to verify what is happening. We have the next message on our wire. We’re decoding it with the new – very cool – key we have. And we get something that doesn’t look completely random. We do it with multiple ones and see some structure in it. It’s always… strange guttural noises I think I pasted the wrong thing here, actually. Very sorry for that. You have to imagine a different message here. Encrypt that using that key and you would see what would be up here. But here would be this random we got from the air. We de-crypt it with that, and get this. And this dissects into an op code which is always at the third byte. And after the op code we actually see the lock key which you remember from one of the first slides – 013755 – this is the key from my lock. So we now got the key from the air, and have full access to the lock. Bad luck for NOKE. applause So 06 is just one of the op codes. When you browse through the Java source you see much more op codes that might happen. So e.g. there’s the Rekey option which you send to the lock, and the lock starts to re-key to regenerate the key, send back the new keys. You can unlock – which is what we just saw. Get the battery level. Set a new Quick Opening Code. Can reset the lock. Can do a firmware update. That looks promising! I have the idea, we will see this op code in the near future. And you can enable ‘key fob’ which a small device is which you can use to open the lock without a phone. So you can send commands to pair those, and add them, and get locks of this (?). So this is just a few, we haven’t played with all of them. The SetQuickCode, I think I sniffed a few… Yeah, but that’s basically the things you can do, and you can decode all of them with the message shown before. So some history of the vendor notification. We did this on the Easterhegg [2016]. Everybody knows Easterhegg is Easter. So this was in April [2016]. Possibly it wasn’t the best idea to send them on April, 1st. But… laughter No, they replied and took it seriously. So they actually very instantly told us they like the research and everything. They knew their crypto isn’t perfect, but the product has to get out. And they were working on a new protocol, they sent a few details of that. We don’t have full details so far, so we can’t really tell if the new protocol is very good. But it looked, from the idea, a little better. They’re bringing out a Bike U-lock which is not out yet. And it’s supposed to have the new protocol from shipping. We will see. A thing which I found very funny is I downloaded a new [NOKE] app in November, and it has a major update in the screen: the ‘Rekey’ button is now hidden! So, remember, that’s the only button which saves you from someone you shared a lock to, to lock him out. So this button now is hidden. Possibly not the best idea. Possibly people weren’t understanding it. But it can be enabled in the ‘Advanced Settings’ menu. So, no problem. But they just recently told me that they’re planning to actually fix that in January. So we’re actually really in a Zeroday here. So the locks are still vulnerable. But 8 months, sorry… I… the conference is now, we couldn’t change that! laughter Ray laughs applause If you use such a NOKE lock I still want to say I like the hardware. It’s quite a nice hardware. Possibly write an open source firmware for it, build your own crypto, during the time. Or just don’t use it for real valuable things. Or use your Aluburka or other shielding while opening it, I don’t know. But just be aware if someone sniffs your communication using his 5 Dollar dev board he probably knows your codes. So, yeah. So much for the NOKE. This is not really the end, it’s just the beginning of the end section. Because we still have one mechanical bypass left. You remember that earlier I mentioned also the Master Lock doesn’t have no mechanical bypass that we found. If you remember Chaos Communication Congress 4 years ago – you can remember from the Rocket standing exactly here – points to picture on slide we did a presentation on this first Bluetooth… not Bluetooth, on this first electronic padlock by Master Lock, where we had a nice mechanical magnet attack, which was found by Michael Hübler by very cleverly drilling a hole, observing the motors, acting with magnets… and found this special move which opens the old Master Lock. And we reported that back then. So 4 years ago we told Master Lock: “Oh, your padlock can be opened with a magnet, this is not very good”. But this was a 30 Dollars padlock, and… oh my god, could be done with a magnet. So this is the new one, and they changed something. Actually it’s something they told us back then that they’re planning to do. They added a shielding metal. So, this very big, thick shielding here which I would use to block all the radiation from whatever it is, around half of the motor is supposed to help. Let’s have a look. silent video starts So this is the Master Lock. We have a bigger magnet. I have to admit you see it’s a much bigger magnet. Those magnets are illegal to possess all over Germany, I hope, soon! And we have a different move. We’re now rotating the magnet. We were shifting it before. – And it’s open! laughter and applause This also is not really Zeroday because as you saw before on the slide by Rose & Ramsey he also told the Master Lock is unpickable. And after the talk at DEF CON I, in the Q&A section somehow mentioned that I doubt that. I didn’t tell what to do exactly because I wanted to give Master Lock some response time. But directly after the talk somebody approached me: “That’s very interesting, I’m with Master Lock!” laughs laughter And I actually showed him this and he filmed it with his mobile phone. So I consider the vendor notified! laughs laughter and applause So I would say: “Works for me!” laughter and applause So I have a message to all these vendors and kickstarters and lock makers: “Don’t try to be smart, be smart! And disclose your crypto protocols!” There’s really no need to make a secret crypto protocol. And if your development department tells you: ”No no, we can’t disclose that, that’s a really silly idea to disclose our crypto!” you probably have bad crypto, and they know it! laughter And, of course, if you build a new thing like a hardware, like a lock e.g. try to get your hardware in the hands of experienced lockpickers, or locksmiths. The shimming bypass, of the Dog & Bone padlock, really, every locksmith in the U.S. would have told them: “You can’t build a 100 Dollar padlock which can be shimmed with a soda can!” Especially if you’re an electronics company what those Dog & Bone people obviously are: Don’t trust on your electronics knowledge. The hardware also has to work. And please, if you give this hardware to people don’t try to get any NDA’s, or “Oh you can’t disclose” – because then they won’t do it, and you will wait just for the product to come out, and disassemble it then. So really… Actually, I must say the NOKE people which I… the lock isn’t working that good but I think the company is doing quite well. They sent us one of their locks for mechanical analysis after our Master Lock presentation. So we tested their lock on our magnetic attack and that didn’t work. And still doesn’t work. So that thing they did good. The other thing is that they didn’t get the crypto right. But okay. People are learning. some laughter So if someone really wants to be smart – and we also tried to tell that [to] NOKE in the kickstarter campaign – try to become the first one. And this is really ‘WTF’. Why is there no – at all – open source lock? Or light bulb? Or vibrator? I have no idea. But… I think you want to sell the hardware! Why don’t make the software open source and make it auditable? applause Oopf… What’s that slide? Oh yeah, there’s Hacker Jeopardy! If you want Hacker Jeopardy to happen next year please send content! laughs applause and cheers I heard from that Sec guy and that Ray guy that they’re really old, and they don’t know the things that the young generation wants to have asked in a Jeopardy. And what Pokémons you have to ask, and stuff like that… So send a few ideas! There’s a German page, but Hacker Jeopardy will be German next year. So, sorry for that. A German page which tells you how to submit ideas, how to make good ideas. And if you send enough content possibly next year there will be Hacker Jeopardy, again. applause So, we have some links. Actually, this is the Zeroday tool we are releasing, by e7p. It’s not on there yet, I think. Or possibly he’s sitting in the audience and uploading it right now. It’s a small Python script. It needs Python3. And it implements this crypto session exchange. So what you basically do is you get the values from your Wireshark, which is all these Hex strings, put them to a file, start the decode-NOKE tool and it will tell you what keycode is in there, what things are set. Currently it only supports, I think, the ‘Open’ command mainly, and the ‘Read Battery’ possibly. But we’ll try to add a few more codes as we decode them. But it’s enough to get the lock code from the air. So with this tool – but you could implement it yourself – you easily can crack the locks. And there’s a blog entry by MH who did a nice paper about the NOKE’s hardware and everything. If you really want to look inside the lock look at this. And then there’s of course the link to the Nordic RF sniffer software. This is one of the decompilers which has the Adblocker blocker on it. And there’s an article from Sec’s blog telling you how to decompile and recompile an app. Which I found quite helpful during the working. So okay. So, thanks for listening. Please, if you have smart things around, and want to play with that, I have one of these dev boards left. So I have 2, one for me and one I can lend to someone who wants to sniff to his/her hardware. Come to the MuCCC assembly and tell me what you want to attack, and I’ll give you my RF sniffer board. Or leave the things there, and we play during Congress. Not today, possibly, but tomorrow I’ll be in the assembly, or someone will be there. And I think now I have basically exactly 10 minutes, and I hope there are some questions. Otherwise I was too quick! Thank you! applause Herald: leise: Hallo! Mikro wär’ schön! Rufender: Musst’ nur anmachen! Herald: Is an! Ray: He wants a microphone for the questions! Herald is told how to switch on microphone Herald: Hah, wer lesen kann ist klar im Vorteil! Ray, thank you very much! Do you have some time later? I might need to ask a favour! Did I told you about that friend that I’m having with the Bluetooth enabled coffee machine? We, we speak later! We have some questions, and we have some questions from the internet. So here we go! Signal Angel: Yes, thank you. Ray, are you aware of any secure Bluetooth locks? With decent crypto? Ray: Actually… not! What I can’t tell is if the crypto of the Master Lock, or the crypto of the Dog & Bone are good, because we really haven’t looked into it. But it wouldn’t really help because the hardware is broken. The NOKE people, as I said, are bringing out a new firmware in January [2017]. I’ll try to make them tell me what they’re doing. Because I’m not really going to reverse-engineer it again. I do that for a vendor once. We don’t have to do it a second time. So I hope they just tell me what they’re doing, and we can have a look if it looks promising. But at least they react. So, possibly, the NOKE is becoming a more secure padlock. But besides that I don’t know any, so far. You can find the talk by Rose & Ramsey on the internet. It’s unusual for DEF CON talks but this DEF CON talk is online. So you see lots of locks there which he attacked, and they all were worse than the ones we had here. So, sorry, no. Which I could recommend. And I wouldn’t recommend it, anyway, because if it’s not open source you don’t know if it’s secure! You just know it’s currently uncracked. So, possibly stick to your old ones! laughs But thanks for the question. Herald: Then we’re gonna hop over to microphone no. 2! Question: Thank you. That was quite a bit of ‘Fremdschäming’. Fun talk. (?) Just one thought: You said that it’s about selling the hardware. Well, maybe it’s not. Because from what I understand most of those devices are cloud-enabled. So I’m pretty sure they collect all the data, and maybe it’s about mining that, for them. I don’t know. Ray: Actually, yes. The NOKE has a Pro version where they sell a company license where you can have a company software to the cloud, and have more features like sharing other’s locks. But still you can make it open source, and make a license that disallows commercial use, or something like that. Open source doesn’t have to mean it’s free to use. And if you have very complicated logic for your company portal, or something, possibly keep that closed-source. But enable me to follow your communication, to understand how keys are generated, and stuff like that. This is not your secret. This is something… this is the elementary function. People should be able to understand an audit. And especially in a commercial environment, if you ask a locksmith or some other security expert: “Would you recommend this device?”, if he can’t look into it he can’t recommend it. So I think also for selling appliances, or selling services open source algorithms or open source protocols would be the best solution. But especially in the lock industry that’s very very uncommon. I had really bad experience talking to normal lock manufacturers about open sourcing their stuff. It’s an idea they don’t understand. They’re about secrets, I don’t know. Let’s hope for the future! laughs Another… Herald: Okay, we had… No. 1 is just coming up! He was queuing at ‘3’ but covering the camera, and then the camera man got a little bit disturbed, and… it’s a long story. ‘1’, we go! Question: I was wondering if you knew about the new locks which advertise their existence, like broadcast things, or things like that? Could you like walk through the street and know there are Bluetooth locks around you? Ray: No, those locks usually don’t broadcast because it would use too much energy. So usually you have to push the shackle of the lock or something. And then it broadcasts. There are actually if you go back to this DEF CON talk I was talking about – and I think that’s enough shaming of Master Lock here – video playback stops if he has door locks and stuff like that, those possibly are connected to [the] power [grid] and advertise all the time. So he did some lock wardriving. But for the padlocks that doesn’t work. But of course you can go and click them, and then… get the idea. And of course you can do the other thing: you could walk around and pretend you’re a lock, and see if someone has the app running, and connects back to you. That might work! Herald: And over to microphone no. 2, please! Question: I was wondering about that strong encryption, meaning AES, and on the other hand the very weak, or vulnerable, or flawed key exchange: do you think that might be due to out-tasking, like they have specified that they want encryption, and have not specified how key exchange is to be handled, and that might be the reason why it takes them 8 months or more to fix that? Ray: This is basically 2 questions. Of course I can only speculate. It might be out-tasking, it might also be that they just had the time… if you follow the NOKE kickstarter campaign – it was all funded in a kickstarter – they had a lot of problems in delivering on time. So there’s lots and lots of comments “I’m waiting for my lock, oh. Oh god, another delay, now you’re claiming manufacturing is difficult…”, so, many, many people saying “you have to come out with that”. So it might be time pressure, it might be out-tasking, and of course it might be that they just specified: “Oh, we want to use AES”. And that’s the other thing, everybody says: “We disclose what we’re using. We’re using AES!” Here we have a very good example, yes, it really is using AES. And it’s using a correct implementation. We actually found it’s a TI example implementation of AES that they’re using. So it’s completely valid AES128, but still it’s completely insecure. So people just claim they’re using AES, or “We’re using SHA-somesing or somesing”. Isn’t enough. You have to know the whole protocol. And that wasn’t the case here. laughs Herald: Okay, then we’re gonna go over to the internet, again! Ray: The internet… of… Signal Angel: Thank you. Actually it’s a follow-up question for the previous one: would it be sufficient to have a hardware-accelerated AES on these Bluetooth thingies? Ray: Actually hardware-accelerated AES doesn’t have to do anything with that. That might be helpful if you have a chip which is a crypto chip, if you have things like side channel attacks. If you would have a key fob which has a secret key in it which should not be extractable, those keys can be extracted with electronic attacks, side channel attacks, power measurements. Against these attacks a crypto chip could help because it has a good implementation. But for this… AES is AES. As I said the implementation of AES is valid. So an accelerated chip wouldn’t help. And they’re not doing bad crypto for performance reasons. It’s only one AES operation. They’re doing it because it’s more difficult to do it right. And it possibly would need asymmetric crypto. That could need acceleration, on the other hand. But it doesn’t have to do with the chip. Herald: Are you queuing there, on ‘5’? lowered voice: Well, then here we go! Question: Okay, two little questions, more hardware related. First one: How could you build a lock which isn’t susceptible to the attack you showed in the video, like flipping the magnet? That’s the one, and the second one is that Trelock, or ABUS I think, says they have an electronic bike lock which doesn’t have any battery, and I’m quite confused how they will do it. Have you any idea? Ray: Actually I don’t know – starting with the second question – the ABUS lock at all, I must admit. But there are e.g. also Cyberlock is it called, they have battery in the key, and you put the key to it. If it’s a Bluetooth lock I don’t know how they’re doing it. It might be possible that you push something and it starts a generator. I’ve seen buttons which you press and they generate the energy to send while you press it. So it might be that, but I don’t know the products. The other question, I must admit I didn’t really understand what you want to know. Can you repeat the first one? Question: Of course. I was just asking how to protect the lock so it can’t be opened by flipping a magnet, like you did in the video. Ray: How to protect it, that’s a very good question. I think we know how NOKE did it. And the thing is I don’t think NOKE did it intentionally. It just happened to be in their design. We can’t open the NOKE because the rotating actor they have is also magnetic. So if I put my magnet there I lock the lock. In the Master Lock it’s some cast metal which is not magnetic. So changing this to magnetic would possibly help. Using a completely different approach, like the motor in The Quicklock, or which needs more power, or works differently like a servo would help. But would be a completely different design. But it’s really a tricky part. There have lots of different locks in the past, also door locks, been attackable by hardware attacks. So building a good, really good mechanic, or electromechanic isn’t easy. Herald: And I think we have time for the last one, at microphone 5. Question: So this isn’t a question, it’s just a precision. At one point during the presentation you talked about open source smart appliances, and you said, nobody really does that. And you urge people to be the first to do e.g. open source sex toys. And it happens that someone is doing that. So on Github it’s Q-dot, if you want to learn more about what they’re doing. They have, you know, several public repositories about ‘teledildonics’. So, you know, just, if anyone wants to check that out, just saying. Ray: Okay, thanks for your self-advertisement. laughter And I was mainly talking about locks, I must admit. I don’t know the other fields so well. But locks is really difficult to get open source. If you have more questions I’ll be at the MuCCC assembly. I’m waiting for you to bring devices, get the dev board, hack the stuff. And thanks again, for listening! applause postroll music subtitles created by c3subtitles.de in the year 2017. Join, and help us!