< Return to Video

Lockpicking in the IoT (33c3)

  • 0:00 - 0:14
    33c3 preroll music
  • 0:14 - 0:17
    Herald: Ray, are you ready?
    Ray: I think I’m ready!
  • 0:17 - 0:20
    Herald: Alright he’s ready…
    Let me introduce you, Ray!
  • 0:20 - 0:24
    “Lockpicking in the IoT”, or
  • 0:24 - 0:27
    “Why adding a Bluetooth Low
    Energy device sometimes
  • 0:27 - 0:30
    isn’t a great idea”. Here we go!
  • 0:30 - 0:36
    applause
  • 0:36 - 0:43
    Ray: Okay, so, welcome everybody
    to “Lockpicking in the IoT”,
  • 0:43 - 0:50
    or the internet of things that were
    never supposed to be on the internet.
  • 0:50 - 0:57
    Okay. There’s a small overview of what
    we’re doing. I’ll introduce a little bit
  • 0:57 - 1:05
    what is this about, show you some hardware
    porn – for the hardware lovers among you –
  • 1:05 - 1:11
    then look a bit deeper in the PCBs of that
    hardware – for the electronics guys –
  • 1:11 - 1:15
    then we look into communication on
    the internet – this is this modern thing
  • 1:15 - 1:19
    everybody wants to have in his coffee
    machine – and then we go for
  • 1:19 - 1:24
    the wireless interface, and see
    how difficult or not difficult it is
  • 1:24 - 1:31
    to attack them. And last but not least
    we will look into Android app hacking
  • 1:31 - 1:36
    – I have to say I’m mainly focusing on
    Android but I’m pretty sure if you’re more
  • 1:36 - 1:41
    the Apple guy there’s similar techniques
    available to go for your Apple app.
  • 1:41 - 1:46
    But for most devices there’s both
    – so even if you’re using iOS you can hack
  • 1:46 - 1:52
    the Android app to get the infos.
    And then the talk is over. Okay.
  • 1:52 - 1:59
    The very important thing first: the
    disclaimer. Basically I want to say
  • 1:59 - 2:03
    I just tested this on my locks, I don’t
    say it’s working on everything,
  • 2:03 - 2:08
    I don’t say it’s a general mistake by
    somebody, might have changed,
  • 2:08 - 2:14
    I might be wrong, I just
    show my research. Okay.
  • 2:14 - 2:20
    This is basically what we’re talking
    about. We have some kind of
  • 2:20 - 2:25
    smart or not-so-smart device which is
    talking over Bluetooth Low Energy
  • 2:25 - 2:31
    to your smart, or not-so-smart phone.
    Which is usually talking, using TLS
  • 2:31 - 2:37
    and HTTP to the ‘Cloud’.
  • 2:37 - 2:40
    So it’s not just locks. The talk is called
    “Lockpicking” because that’s the thing
  • 2:40 - 2:43
    we’re actually going to attack. But
    the techniques here shown work
  • 2:43 - 2:46
    for basically all of these
    Bluetooth Low Energy devices.
  • 2:46 - 2:51
    There are e.g. different light bulbs.
    I found some interesting reports
  • 2:51 - 2:56
    on light bulbs that don’t use
    any form of authentication.
  • 2:56 - 2:58
    So you can connect to your neighbor’s
    light bulb and change a color, or
  • 2:58 - 3:02
    turn it on or off. So, finally,
    Blinkenlights in your neighborhood!
  • 3:02 - 3:04
    mumbles and laughter
  • 3:04 - 3:08
    Then of course there’s cars. Everybody’s
    talking about cars today. I just heard
  • 3:08 - 3:12
    a talk about cars. They’re not really
    using Bluetooth Low Energy.
  • 3:12 - 3:14
    But still they use an app and are
    controlled over the internet, so,
  • 3:14 - 3:19
    it’s kind of on-topic. Then there’s
    vibrators. I mean, unsafer cyber sex
  • 3:19 - 3:25
    never has been easier. Actually I don’t
    have one of those, so, if anybody has,
  • 3:25 - 3:30
    please bring one over to play with it.
    But I’m pretty sure they have high-class
  • 3:30 - 3:33
    security. laughter
    And then there’s button pushers.
  • 3:33 - 3:39
    I just learned of that yesterday and
    I thought “WTF, a button pusher!?”
  • 3:39 - 3:42
    laughter
  • 3:42 - 3:49
    applause
  • 3:49 - 3:52
    This is a Bluetooth Low Energy device
    which you can communicate to and
  • 3:52 - 3:55
    make it press a button. Here it’s pressing
    the Delete key on my notebook.
  • 3:55 - 4:00
    So finally I have a Bluetooth LE
    enabled Delete key on my notebook.
  • 4:00 - 4:03
    laughter
    Very, very helpful. Of course, if you
  • 4:03 - 4:07
    add that to your door opener at home
    you can do it again – lockpicking.
  • 4:07 - 4:10
    We haven’t hacked that yet because
    I just saw it yesterday but it didn’t look
  • 4:10 - 4:15
    very encrypted. It has some secret, some
    shared string, we didn’t understand.
  • 4:15 - 4:21
    But possibly this congress
    we will look into it.
  • 4:21 - 4:24
    Okay, then there’s cars. I’m not
    sure, who read this message that
  • 4:24 - 4:30
    Tesla had a big app hack? Nobody? Oh.
    I thought, everybody read it because
  • 4:30 - 4:36
    it even was on Heise. And it obviously is
    a very big vulnerability, Elon Musk has
  • 4:36 - 4:40
    to get better on this and
    everybody’s stealing these things…
  • 4:40 - 4:47
    how are they called…
    oh yeah, these ‘smart cars’.
  • 4:47 - 4:51
    And they even have colors! So who
    wouldn’t want to steal one of those?
  • 4:51 - 4:54
    laughter
  • 4:54 - 4:59
    The bad news is actually that wasn’t
    really a hack. What they showed is
  • 4:59 - 5:04
    that the app is able to start the car.
    That’s in the manual.
  • 5:04 - 5:10
    So what they told is: “Yeah, but if I hack
    your phone I can start your car!”
  • 5:10 - 5:14
    Then they realized, “Oh, you also need the
    password because for starting the car
  • 5:14 - 5:18
    the app actually asks for the password
    again.” – “Yeah but if I hack your phone
  • 5:18 - 5:21
    I can install a fake app that asks for
    the password; and if you enter it
  • 5:21 - 5:25
    I can steal your car!” – Oh, surprise!
    laughter
  • 5:25 - 5:28
    I mean this is not the kind of hacking
    we’re talking about. And they then
  • 5:28 - 5:33
    suggested the app should be more
    protected against reverse engineering.
  • 5:33 - 5:39
    What would that change in this aspect?
    I can create a fake app without even
  • 5:39 - 5:43
    decompiling the original one. So,
    of course if you don’t have security
  • 5:43 - 5:46
    on your phone working, if you install
    apps that are not secure your data
  • 5:46 - 5:51
    is not secure, and your Teslas get stolen.
    But I didn’t see anything in this ‘hack’
  • 5:51 - 5:57
    actually being a hack.
    So, while talking about…
  • 5:57 - 6:01
    applause
  • 6:01 - 6:04
    Spare your applause for this one!
  • 6:04 - 6:08
    Talking about obfuscation. That’s really
    a thing some people understand differently
  • 6:08 - 6:14
    than I do. I try to say [to] people:
    “security by obscurity does not work!”
  • 6:14 - 6:18
    So if you obfuscate your app, possibly
    it slows down researchers like us.
  • 6:18 - 6:22
    But the people doing that for money, who
    want to sell exploits, they will still put
  • 6:22 - 6:26
    the energy into it. And sell their
    exploits even more expensive.
  • 6:26 - 6:30
    And the exploit will even be longer out
    there because the independent researchers
  • 6:30 - 6:34
    won’t find the vulnerabilities that fast.
    The idea is: good crypto does not have
  • 6:34 - 6:40
    to be secret to be secure. So, no, please
    don’t obfuscate your apps better.
  • 6:40 - 6:45
    Build your protocols better. But as said
    before I didn’t see any aspects there
  • 6:45 - 6:48
    in Tesla. Possibly they should make it
    obvious that you can start the car with it
  • 6:48 - 6:51
    and make it ‘disableable’, and
    what… things like that, but
  • 6:51 - 6:55
    it’s not a security issue. Okay.
  • 6:55 - 7:00
    So let’s go back to locks. Because,
    actually the talk is called “Lockpicking”.
  • 7:00 - 7:04
    So what do these smart locks usually do?
    Of course they can be opened.
  • 7:04 - 7:08
    Usually your… with your phone near your
    lock you put something on the lock
  • 7:08 - 7:11
    and communicate – the lock opens.
    Optionally you have to press
  • 7:11 - 7:16
    something on the phone, so it’s
    a 2-step process to unlock,
  • 7:16 - 7:20
    which is actually a quite good idea
    because of some obvious scenarios
  • 7:20 - 7:24
    which will work otherwise. Then – and
    this is different from normal locks –
  • 7:24 - 7:28
    they can be shared to friends. It’s
    a big feature. They try to convince you
  • 7:28 - 7:32
    why these smart locks are so smart.
    When I’m not at home I can send
  • 7:32 - 7:36
    somebody the code, and give him the
    possibility to open my bike shed
  • 7:36 - 7:41
    for just one hour. Because I can, of
    course, revoke that at time restrictions.
  • 7:41 - 7:45
    So that’s what the big advantage is,
    compared to a traditional lock.
  • 7:45 - 7:49
    Except, of course, it’s to be much more
    secure because you can’t pick it anymore.
  • 7:49 - 7:53
    And then those obviously have some
    failsafe mode in case your phone breaks
  • 7:53 - 7:57
    and whatever. You can enter a click code,
    and can enter a code by some buttons
  • 7:57 - 8:02
    or something to open it without the
    phone. But that is nothing we’re going
  • 8:02 - 8:09
    to look into today. So from these basic
    ideas, of course, there come some basic
  • 8:09 - 8:12
    attack vectors. What I could
    try to do: I could try to bypass
  • 8:12 - 8:19
    the sharing restrictions. So possibly
    go in a different time window.
  • 8:19 - 8:21
    I could change the time on my phone,
    probably. Would that work?
  • 8:21 - 8:25
    Things like that. Open the lock after
    it was revoked. Of course then
  • 8:25 - 8:28
    that’s what everybody thinks about when
    talking about Bluetooth: I could try
  • 8:28 - 8:33
    to get the keys. From sniffing
    somebody’s Bluetooth LE connection.
  • 8:33 - 8:38
    That’s something we’re going to do today.
    Then this is what I was talking about
  • 8:38 - 8:42
    why the ‘2-button-press’ is a good idea.
    You could relay opening codes.
  • 8:42 - 8:45
    If you have the ‘instant-open’ feature
    I could approach you, pretend to be
  • 8:45 - 8:49
    your lock, your phone sends me an OPEN
    command, I could relay it to your lock,
  • 8:49 - 8:53
    completely somewhere else, and it would
    open. So I think this is something
  • 8:53 - 8:57
    you can’t really stop except with
    some very tricky mechanisms.
  • 8:57 - 9:02
    Possibly ‘timing’ or some… things like
    that. So this ‘instant open’ feature
  • 9:02 - 9:07
    is possibly not the best idea. Then
    we have the option to attack the lock
  • 9:07 - 9:14
    or app software directly. I mean, it’s
    software. So it will have buffer overflows.
  • 9:14 - 9:18
    It might have other weaknesses. It could
    just do not verify some things. If I tell
  • 9:18 - 9:22
    I’m another person - does it really check
    if I have the rights, and everything?
  • 9:22 - 9:27
    But this is something – I think the only
    thing – I don’t have in this talk today.
  • 9:27 - 9:33
    Because the other methods
    worked already. Okay.
  • 9:33 - 9:38
    Going to look at the hardware.
    So, basically, if you’re
  • 9:38 - 9:43
    a lockpicker or some other reverse-
    engineer, if you get a new hardware
  • 9:43 - 9:46
    you want to take it apart. If you
    can’t take it apart, you can’t open it
  • 9:46 - 9:50
    you don’t own it. And here’s – if you
    want to do it yourself – these tips
  • 9:50 - 9:55
    how to open it. The NOKE is very nicely
    built. When you have legally or
  • 9:55 - 9:58
    legitimately unlocked your NOKE you can
    disassemble it without doing any damage
  • 9:58 - 10:03
    to it. [You] just need a screw driver and
    it completely comes apart. Very nice design.
  • 10:03 - 10:07
    The Master Lock – you have to
    drill out 4 rivets. This is a bit sad
  • 10:07 - 10:11
    because after that it won’t be a very good
    lock anymore. But it’s not a problem
  • 10:11 - 10:16
    because it isn’t before,
    from my experience.
  • 10:16 - 10:21
    applause and some laughter
  • 10:21 - 10:25
    And then there’s the Dog & Bone lock,
    which is a lock I just got recently.
  • 10:25 - 10:29
    Its a little bit tricky to open but you
    don’t have to do a lot of damage.
  • 10:29 - 10:32
    If you have it opened you can pull out
    a pin in the back – thank Jan (?)
  • 10:32 - 10:36
    for finding that out. And then you can
    remove screws and it really comes apart
  • 10:36 - 10:40
    nicely. So how do these locks
    look, now? This is the NOKE.
  • 10:40 - 10:46
    So basically you see a PCB, you
    see a normal lock body like here,
  • 10:46 - 10:50
    with a shackle. There’s a motor at the
    PCB. The motor turns some locking element
  • 10:50 - 10:53
    in here. And if it’s in the right position
    the lock opens. For the NOKE there’s
  • 10:53 - 10:59
    a very nice paper by the SSDeV member
    Michael Hübler. I have a link at the end
  • 10:59 - 11:06
    of the presentation.
    And neither he nor me did find
  • 11:06 - 11:12
    any mechanical bypasses for that lock.
    So the mechanics look okay.
  • 11:12 - 11:16
    Then there’s the Master Lock. It is very
    similar, but I have to say they invented
  • 11:16 - 11:21
    this mechanism with the motor in this
    locking element first. It has 4 buttons
  • 11:21 - 11:27
    on the PCB which you can use to enter
    a code. Has 2 CPUs, pretty standard design.
  • 11:27 - 11:32
    And here are the rivets you have
    to drill out to make it open.
  • 11:32 - 11:37
    The Dog & Bone is a little bit more
    clumsy. It’s a bigger lock. It comes apart
  • 11:37 - 11:42
    in quite some pieces. What I really liked
    was that motor with that gear box. I think
  • 11:42 - 11:47
    it’s like 1:2000 or something. So it
    really gets a lot of power from the
  • 11:47 - 11:54
    very small motor. So what does it do with
    it? It turns this element, and this element
  • 11:54 - 11:59
    retracts these 2 spring loaded locking
    elements which are locking the shackle.
  • 11:59 - 12:05
    If you’re a lockpicker you will ask:
    “Spring loaded? Seriously?
  • 12:05 - 12:10
    Have you ever heard about the term
    ‘Shimming a lock’?” ‘Shimming a lock’
  • 12:10 - 12:16
    is inserting some metal at the shackle,
    and pushing back the springs.
  • 12:16 - 12:23
    It’s a very standard method for padlocks
    in the 5 Dollar range, I would say.
  • 12:23 - 12:27
    Locks starting at 10..15 Dollars
    or Euros or whatever, in that area
  • 12:27 - 12:32
    usually can’t be shimmed anymore.
    When I opened the Dog & Bone lock
  • 12:32 - 12:36
    I instantly realized: it’s
    spring loaded, it is shimmable.
  • 12:36 - 12:40
    A short search on Google
    found out that Mr. Locksmith,
  • 12:40 - 12:43
    a lockpicker from the U.S. who
    does some good Youtube videos,
  • 12:43 - 12:48
    found [that] out months before.
    And of course, it’s shimmable!
  • 12:48 - 12:52
    You put in some thin metal sheets
    – he built them from a cutaway
  • 12:52 - 12:56
    of a soda can, puts them
    in and the lock opens.
  • 12:56 - 13:02
    But this is not a 5 Dollar lock. This is
    an 80..100 Dollar Bluetooth padlock.
  • 13:02 - 13:06
    And you shim it with cut metal.
    Okay. No need to go into
  • 13:06 - 13:12
    the Bluetooth Low Energy for that one.
    laughter
  • 13:12 - 13:16
    And, as a small teaser: I also didn’t
    say there’s no mechanical bypass
  • 13:16 - 13:19
    for the Master Locks. But
    we’ll come back to that.
  • 13:19 - 13:22
    Okay. The electronics. This is the
    electronics of the NOKE. Basically
  • 13:22 - 13:26
    you see there’s one CPU, and something
    that’s called an ‘H bridge’ which is
  • 13:26 - 13:32
    used to control a motor. All the rest
    is pretty standard electronics, so,
  • 13:32 - 13:37
    very simple design.
    The Master Lock has 2 CPUs,
  • 13:37 - 13:42
    has the buttons on the PCB,
    also quite simple electronics.
  • 13:42 - 13:46
    And this is the MCUs. The interesting
    thing I see is there’s a very common chip.
  • 13:46 - 13:50
    It’s the Nordic nRF51822.
    I find it basically everywhere.
  • 13:50 - 13:54
    It’s in light bulbs, it’s
    in 3 of the locks I have here.
  • 13:54 - 13:58
    Or 4, if you count the Ivation
    and Nathlock [not] as the same.
  • 13:58 - 14:01
    Only the Master Lock
    uses MSP430, which is…
  • 14:01 - 14:09
    The nRF is a… basically ARM core.
    The MSP430 is a much smaller chip,
  • 14:09 - 14:13
    it’s from Texas Instruments, and it’s
    a very low power consumption chip.
  • 14:13 - 14:19
    It was also used in the previous
    non-Bluetooth LE electronic lock.
  • 14:19 - 14:22
    But it’s basically also a normal
    microcontroller, and you can program it.
  • 14:22 - 14:27
    So, program it. That means you can
    just use any ARM Flash board.
  • 14:27 - 14:32
    I used the ST-Link interface from an
    STM32 dev board we had in our hackerspace.
  • 14:32 - 14:38
    And interfaced it to the chip
    of the NOKE padlock here.
  • 14:38 - 14:42
    So e.g. using OpenOCD, but…
    there are different tool chains (?) but
  • 14:42 - 14:47
    this is one where you find some info on
    the internet, how to use it with the nRF.
  • 14:47 - 14:50
    Using OpenOCD you get an
    interface to connect to the chip,
  • 14:50 - 14:55
    and then you can issue commands
    like ‘Probe the Flash in it’;
  • 14:55 - 14:58
    you could read the Flash, you
    could write a new firmware to it,
  • 14:58 - 15:02
    and stuff like that.
  • 15:02 - 15:06
    With the old Master dialSpeed padlock
    which is pre-Bluetooth-LE but
  • 15:06 - 15:11
    already electronic, a few years ago,
    I think 4 years ago we presented
  • 15:11 - 15:14
    about that one, that was not read
    protected, you could change the firmware,
  • 15:14 - 15:18
    you could actually get the codes from
    reading the flash, and you could access
  • 15:18 - 15:22
    the Flash content without opening
    the lock. So that was really funny.
  • 15:22 - 15:26
    Not usable as a lock, but I re-flashed
    it to a Simon Says style game where
  • 15:26 - 15:31
    you have to repeat the sequence it shows
    you. Funny lock for your hackerspace.
  • 15:31 - 15:33
    Unfortunately, or fortunately…
    No, I would say ‘unfortunately’,
  • 15:33 - 15:37
    the NOKE firmware was read protected.
    Because there’s no need for it.
  • 15:37 - 15:40
    The NOKE firmware Flash ports can’t
    be accessed without opening the lock.
  • 15:40 - 15:44
    So you don’t lock somebody out
    by read protecting it, except for
  • 15:44 - 15:48
    the legitimate owner. But okay, it was
    read protected, and I was saying: “Oh,
  • 15:48 - 15:52
    decompiling firmware, that’s hard
    work anyway, let’s skip that one.”
  • 15:52 - 15:55
    But of course you could use these flash
    interfaces to write own firmwares
  • 15:55 - 15:59
    to these locks. Possibly make them open
    source one day. Or do something else.
  • 15:59 - 16:03
    Or just use them as cool dev
    boards. With some actors on it.
  • 16:03 - 16:09
    So, let’s go for the first
    interesting thing, I would say.
  • 16:09 - 16:14
    The communication with the ‘Cloud’.
  • 16:22 - 16:25
    So your phone speaks to some servers
    which is provided by the vendor
  • 16:25 - 16:30
    of your hardware usually. And
    it’s usually a TLS encrypted link
  • 16:30 - 16:36
    using HTTP. Over this link the application
    on your phone sends login data,
  • 16:36 - 16:40
    gets back from the cloud the information
    about the lock. So you can install
  • 16:40 - 16:43
    your app on a new phone, enter your
    login credentials and instantly use
  • 16:43 - 16:47
    all your locks. Or the locks that were
    shared to you. Usually these apps also
  • 16:47 - 16:51
    send events to the cloud, when you open
    your locks. So if you share the lock
  • 16:51 - 16:55
    with someone you can see on your other
    phone that he opened it, and possibly
  • 16:55 - 17:00
    where he opened it. And things like that.
    And of course also data is edited,
  • 17:00 - 17:05
    if you add a new code to it or something.
    So this is sent over the link.
  • 17:05 - 17:09
    So, some people would say: “Oh,
    but TLS encryption is secure, isn’t it?”
  • 17:09 - 17:13
    Of course, usually it is. There are flaws
    which you hear about from time to time
  • 17:13 - 17:17
    at these conferences. But that’s not the
    problem here. The problem is – but
  • 17:17 - 17:21
    it’s not a problem, it’s nice for us
    researchers – you own the phone
  • 17:21 - 17:26
    with the app. You control the app. You can
    even modify the app. But owning the phone
  • 17:26 - 17:30
    you control the TLS trust store,
    with the certificate authorities. So
  • 17:30 - 17:36
    you can install a new CA and trust your
    own servers. People could try to
  • 17:36 - 17:40
    prevent this using key pinning in the app.
    But, again, you also control the app.
  • 17:40 - 17:44
    You can change the app, you can remove
    the key pinning. So, basically, breaking
  • 17:44 - 17:48
    into this TLS is something the vendor
    has to expect. It’s your device,
  • 17:48 - 17:52
    it’s your communication. You can
    listen to it. So, and the nice thing
  • 17:52 - 17:56
    – and this is what I’m trying to tell all
    of you here in this talk – these things
  • 17:56 - 17:59
    are not difficult. There are nice
    available tools; and if you have some apps
  • 17:59 - 18:04
    which do some things you want to know –
    install such a tool, watch your app doing
  • 18:04 - 18:08
    transferring data, and look what your
    apps actually communicate. Actually it’s
  • 18:08 - 18:12
    quite interesting to see what your phone
    communicates to Google all the time.
  • 18:12 - 18:16
    I realized it: one of these apps is
    telling Facebook when I started,
  • 18:16 - 18:22
    every time. What the Fuck?? But you easily
    see it. What you do is you install e.g.
  • 18:22 - 18:26
    mitmproxy, it’s a small hell of Python
    dependencies, but it’s usually installable
  • 18:26 - 18:29
    on a Linux, and even on a Mac machine.
    Haven’t tried it on Windows but
  • 18:29 - 18:33
    I’m pretty sure there’s options for that.
    And you install it as a web proxy, so,
  • 18:33 - 18:38
    you change the internet connection of your
    phone, and say: “Oh, this Wi-Fi has to use
  • 18:38 - 18:44
    a proxy, enter the IP of your proxy…”
    And mitmproxy creates fake certificates
  • 18:44 - 18:47
    on the fly. So whatever side you access
    it creates a new certificate looking
  • 18:47 - 18:52
    the same, signs it with the fake CA, and
    you can install the fake CA just
  • 18:52 - 18:56
    by going to http://mitm.it/
    So, man-in-the-middle it.
  • 18:56 - 18:59
    And there’s a link to install a fake CA
    on your phone. So that’s actually really
  • 18:59 - 19:04
    [done] in, like, 5..10 minutes, with
    compiling of the Python stuff 15 minutes,
  • 19:04 - 19:07
    and you have a working man-in-the-middle
    setup and can watch your communication.
  • 19:07 - 19:11
    This is what the app looks like. So
    we see here a few POST requests
  • 19:11 - 19:17
    to the NOKE app. We get replies;
    actually we see funny 403’s here.
  • 19:17 - 19:21
    I’m not sure why it’s doing that. But
    okay. But this is what the NOKE app
  • 19:21 - 19:25
    does on startup. And of course we can
    not just see the requests, we can look
  • 19:25 - 19:30
    into the request itself. And it’s e.g.
    a good way to recover your password.
  • 19:30 - 19:35
    Possibly I should have blurred it here.
    So if you have forgotten your password
  • 19:35 - 19:39
    you just sniff your communication. It
    also works for your Play Store password,
  • 19:39 - 19:43
    usually. Usually they use a token
    but some time it’s renewed.
  • 19:43 - 19:47
    So every app that has a password
    and sends it to the cloud – you can
  • 19:47 - 19:53
    recover it with that. And from
    this login you get data back.
  • 19:53 - 19:57
    And in the NOKE app it’s
    usually done like I send
  • 19:57 - 20:00
    login, with user and password,
    and I get a token back.
  • 20:00 - 20:03
    And then all following your request
    I just have to send this token, and
  • 20:03 - 20:09
    then I’m authenticated. So that’s
    an okay mechanism I would say.
  • 20:09 - 20:11
    So. What do we get also? We
    have a GETLOCKS key, and
  • 20:11 - 20:15
    when we call ‘getlocks’ we get
    the information about our locks.
  • 20:15 - 20:19
    So this basically is an ID of the lock.
    This is a lock key. There’s something
  • 20:19 - 20:22
    to remember: 0137 – we’ll see that later.
  • 20:22 - 20:25
    You see the MAC of the lock,
    you see a picture URL
  • 20:25 - 20:29
    where the application shows me
    the lock – if I have multiple locks
  • 20:29 - 20:34
    I can assign different pictures
    to it. And this is a quick open code
  • 20:34 - 20:37
    where I can push on the
    shackle to open this lock.
  • 20:37 - 20:41
    So this is all no hacking because
    this data I’m supposed to know.
  • 20:41 - 20:44
    It’s my lock, I can know the information,
    then it’s not a big problem.
  • 20:44 - 20:48
    But it’s interesting to see what it’s
    doing to understand how it’s working.
  • 20:48 - 20:51
    Then we have the next
    thing, the ‘shared locks’.
  • 20:51 - 20:56
    This is more interesting, possibly because
    I see: “Oh, I’m allowed to use it all day,
  • 20:56 - 20:59
    starting at that day,
    starting at that time,
  • 20:59 - 21:04
    ending at that date, at that time”.
    And this lock has a key,
  • 21:04 - 21:08
    and there’s another key.
    And another MAC.
  • 21:08 - 21:13
    So, the nice thing is, the
    lock does not have a time.
  • 21:13 - 21:17
    The lock does not know
    when I’m allowed to open it.
  • 21:17 - 21:22
    So all I need is this key. And the nice
    thing also is I don’t have to manipulate
  • 21:22 - 21:27
    the app in any way. I can use Mitmproxy
    to change the data on the fly.
  • 21:27 - 21:33
    So I just tell Mitmproxy,
    please change 2016 to 2066,
  • 21:33 - 21:37
    then the reply comes back, and then the
    NOKE app thinks “Oh, he’s still allowed
  • 21:37 - 21:42
    to use that”. Of course the NOKE people
    were clever and do an online check.
  • 21:42 - 21:47
    Which actually means you can only
    unlock a lock if you have a shared lock.
  • 21:47 - 21:51
    Your own lock you can use offline. But a
    shared lock you can only use when you
  • 21:51 - 21:55
    have internet. Not good if it’s the cellar
    or something. But it does an online check,
  • 21:55 - 22:02
    it asks: “Can unlock?” and the cloud
    answers: “Yes, success, can unlock”.
  • 22:02 - 22:07
    Of course I can also fake that! So this
    is completely bogus; it’s unnecessary
  • 22:07 - 22:10
    to be online. I could do it offline. If
    I want to hack the lock I can do it
  • 22:10 - 22:15
    in the cellar. Only the legitimate
    user has to be online.
  • 22:15 - 22:22
    So the sharing feature of the NOKE already
    is broken just with the Mitmproxy tool.
  • 22:22 - 22:28
    Really, that’s not big hacking. They
    could have thought about that. But okay.
  • 22:28 - 22:34
    So, once somebody shares
    a lock to you, a NOKE to you,
  • 22:34 - 22:37
    you have this key and you can
    use this key from then forever on.
  • 22:37 - 22:43
    Using the original app. That’s the nice
    thing. You don’t have to change it.
  • 22:43 - 22:48
    One thing which is positive about the
    architecture here, the key that they use
  • 22:48 - 22:52
    for sharing is a different key than you
    have to operate your lock. That means
  • 22:52 - 22:57
    with this sharing key I can not
    modify the lock. I can’t re-key it,
  • 22:57 - 23:02
    or change the click code, or things
    like that. So I just can open it.
  • 23:02 - 23:07
    And they have an option to change the
    key of the lock. So I can go to my lock
  • 23:07 - 23:12
    and say “Re-key!”, and the they do a new
    key. But for that I have to go to my lock.
  • 23:12 - 23:16
    So that’s nothing if I share the lock to
    you from Congress, and the lock is
  • 23:16 - 23:22
    somewhere in… Salzburg! Then that
    doesn’t work. So not really helping.
  • 23:22 - 23:26
    Possibly one time keys or something like
    that would be a better option, or just
  • 23:26 - 23:30
    some challenge/response mechanism.
    If you have to be online, why not.
  • 23:30 - 23:34
    But that’s something for the future.
    Currently lock sharing is not very secure,
  • 23:34 - 23:40
    and I would advise you to keep that in
    mind when you use the Sharing feature.
  • 23:40 - 23:44
    Oh, regarding dumping firmware: as I said
    before a firmware was not dumpable
  • 23:44 - 23:48
    from the NOKE. The Dog & Bone I didn’t
    even try to dump the firmware because
  • 23:48 - 23:52
    it was shimmable. But they sent me
    an URL in the CONNECT where I can
  • 23:52 - 23:59
    download the firmware.
    And if you… laughs
  • 23:59 - 24:04
    laughter and applause
  • 24:04 - 24:07
    Again, I don’t consider this
    a vulnerability. I think if I own the lock
  • 24:07 - 24:11
    I should be allowed to read the firmware.
    If you download that it’s an actual
  • 24:11 - 24:15
    hex dump of the firmware. It looks like
    directly what you would flash on the chip.
  • 24:15 - 24:18
    So if you want to do some firmware
    reverse engineering that’s a very easy
  • 24:18 - 24:22
    starting point to get the firmware from
    the internet, disassemble it, play with it,
  • 24:22 - 24:24
    flash it possibly to your own dev
    board without even owning the lock,
  • 24:24 - 24:30
    to play with it. Why not. Okay, so,
    so much for the app communication.
  • 24:30 - 24:34
    You can do quite a lot with it already.
    But we want to go a little deeper.
  • 24:34 - 24:38
    We want to go for the Bluetooth Low
    Energy level. So the communication
  • 24:38 - 24:44
    between my phone and my lock.
    Or my vibrator. Or whatever.
  • 24:44 - 24:49
    So Bluetooth Low Energy is newer, but
    actually easier to sniff than Bluetooth.
  • 24:49 - 24:53
    There’s a talk called “With Low
    Energy comes Low Security”
  • 24:53 - 24:58
    if you want to have an introduction to
    that. You find it on Youtube. Basically,
  • 24:58 - 25:02
    it has 3 security modes. But the most
    common used are NON and ADHOC
  • 25:02 - 25:07
    which is like almost none security. And
    the third one would be pairing with a code
  • 25:07 - 25:11
    which is usually a 6-digit number.
    If you listen to that pairing you also
  • 25:11 - 25:16
    own everything. This improved with
    Bluetooth Low Energy 4.2, or Bluetooth 4.2
  • 25:16 - 25:21
    which includes a new Low Energy standard.
    But this is not implemented very commonly
  • 25:21 - 25:25
    today, and won’t be in the
    very near future. Because
  • 25:25 - 25:30
    not so many devices support it. So for now
    Bluetooth Low Energy is an easy target
  • 25:30 - 25:34
    to get into research. There’s available
    tools for it like the Ubertooth One
  • 25:34 - 25:39
    by Mike Ossmann. The Adafruit
    BTLE sniffer for… very cheap.
  • 25:39 - 25:43
    And you can build your own one by flashing
    a firmware available from Nordic
  • 25:43 - 25:47
    directly to any dev board
    with this chip you have.
  • 25:47 - 25:51
    So this is the hackerspace entry point.
    If you have this stuff lying around…
  • 25:51 - 25:55
    Otherwise I would recommend going
    for the Adafruit Sniffer. It’s orderable
  • 25:55 - 25:59
    even in Europe, very easily.
    So not a big problem.
  • 25:59 - 26:03
    But the very cheap option is:
    get a 3..5 Euros dev board
  • 26:03 - 26:07
    like this from China,
    use your STM32 programmer.
  • 26:07 - 26:10
    I have another board here which is
    a serial interface. But you could use
  • 26:10 - 26:15
    your normal FTDI USB-to-Serial,
    also. And then this board
  • 26:15 - 26:22
    is identical to the Adafruit Bluetooth
    LE Sniffer, for like 5 bucks.
  • 26:22 - 26:26
    Okay. Talking about this research.
    This is nothing nobody did before.
  • 26:26 - 26:31
    Somebody like e.g. Rose & Ramsey did it at
    DEF CON and presented quite a nice talk
  • 26:31 - 26:37
    where he analyzed a lot of locks. He had
    like 15 locks of it, and 12 of them broken.
  • 26:37 - 26:41
    So it was really plain text passwords
    on the Bluetooth LE, for the Quicklock,
  • 26:41 - 26:45
    iBluLock, Plantraco Phantomlock.
    I hope that’s correct.
  • 26:45 - 26:49
    I don’t claim that to be true. But he told
    [it] in the talk. He found replay attacks
  • 26:49 - 26:54
    on these locks. So you can just resend
    the same code that you saw before,
  • 26:54 - 26:57
    even without understanding it. But he
    stopped where it became interesting.
  • 26:57 - 27:02
    And instead of that posted
    this slide. Which I hate.
  • 27:02 - 27:07
    He wrote about uncracked locks. And
    the first one was the NOKE padlock.
  • 27:07 - 27:12
    And for the time line: at that point
    I already had disclosed to NOKE
  • 27:12 - 27:16
    our findings. Which you will see today.
    So the NOKE company knew about
  • 27:16 - 27:21
    the lock being completely broken on the
    crypto layer [at that time]. But they see
  • 27:21 - 27:24
    this talk by Rose & Ramsey and post
    a blog post: “NOKE just one of the few
  • 27:24 - 27:30
    Bluetooth locks to pass hacker testing”…
    SERIOUSLY?? They were notified!
  • 27:30 - 27:34
    And they… we had active communication
    about them changing the crypto protocol.
  • 27:34 - 27:39
    Possibly the social network people are
    not so close with the technical people.
  • 27:39 - 27:45
    But okay. So, let’s crack it. Using the
    Nordic Bluetooth LE sniffer firmware,
  • 27:45 - 27:49
    which is… unfortunately the easiest way
    to use is on Windows. But you can use it
  • 27:49 - 27:53
    with Python also on Linux. And
    Wireshark integration isn’t that nice…
  • 27:53 - 27:58
    So if you have a Windows, or Windows
    VM it’s the more easy entry point.
  • 27:58 - 28:02
    Here you have a text interface where
    you say: “I want to sniff to this device”,
  • 28:02 - 28:05
    then you get a lot of lot of lot of packets
    here. Mostly ‘discovery, discovery, discovery’.
  • 28:05 - 28:09
    You have to look for the bigger packets.
    This was a bigger packet with some payload,
  • 28:09 - 28:14
    and it contains a very long string
    which looks completely random.
  • 28:14 - 28:19
    So I see from phone to NOKE there’s
    random; from NOKE to phone there’s random.
  • 28:19 - 28:25
    Looks actually encrypted. And NOKE
    is claiming they are using AES128.
  • 28:25 - 28:29
    So I didn’t even try to understand
    what I see here because
  • 28:29 - 28:33
    if it’s AES encrypted you
    won’t find any meaning in it.
  • 28:33 - 28:37
    So let’s put the sniffing aside for
    a moment. We can’t sniff to the data.
  • 28:37 - 28:41
    We can get this communication off the air.
    But for the NOKE we can’t do anything
  • 28:41 - 28:48
    with that. So let’s go for app hacking.
  • 28:48 - 28:52
    There are different approaches. One
    – the easiest… not the easiest but
  • 28:52 - 28:59
    the first one we did –
    is manipulating the apps.
  • 28:59 - 29:04
    So you can get an APK from your phone very
    easily with ADB. You don’t have to have
  • 29:04 - 29:08
    a rooted device for that. You can just
    enable Devel mode and copy the APK over.
  • 29:08 - 29:12
    There’s lots of tutorials on the internet
    how to do it. It’s basically 3 calls
  • 29:12 - 29:17
    on the shell. And those APKs can easily
    be disassembled with a tool like SMALI.
  • 29:17 - 29:21
    You can change things in it, like
    a URL. You can change values.
  • 29:21 - 29:26
    Then you can re-assemble it, self-sign it,
    and put it again on your phone.
  • 29:26 - 29:30
    One thing you can do with that is
    change the app to use a different URL
  • 29:30 - 29:34
    for its communication. And that’s actually
    quite a nice idea. Because we saw before
  • 29:34 - 29:38
    we can completely understand this
    protocol. It’s not a complicated protocol.
  • 29:38 - 29:41
    It’s sending some requests, and it’s
    getting some JSON responses. I can
  • 29:41 - 29:45
    write this in a Python script with a few
    100 lines, and fake their server.
  • 29:45 - 29:51
    So I actually could run my NOKE lock – if
    it would be having good crypto, but okay –
  • 29:51 - 29:55
    on my own server. Not connected to their
    cloud, but build my own NOKE app and
  • 29:55 - 30:01
    have it communicate with my NOKE server.
    Why not. Possibly in the far future
  • 30:01 - 30:05
    NOKE doesn’t exist anymore, who knows?
    It happened before to other companies:
  • 30:05 - 30:08
    the servers are gone – your hardware is
    gone. If you understand the protocol,
  • 30:08 - 30:11
    if you have sniffed it before you can
    reimplement it and continue using
  • 30:11 - 30:16
    your hardware. Except for that I wouldn’t
    like to have my locks in the cloud!
  • 30:16 - 30:20
    We actually used this method during
    the analysis of the NOKE lock
  • 30:20 - 30:23
    to change a random number generator
    in the app to always return ‘42’.
  • 30:23 - 30:28
    Thanks to Sec for that one. He did
    a binary patch on the MIPS binary on it.
  • 30:28 - 30:32
    We just put it in and had a nice
    random number to spot it easier
  • 30:32 - 30:38
    on the communication. The other thing
    is you can decompile these app APKs.
  • 30:38 - 30:42
    You get it, again with ADB. Run it through
    a decompiler like Jadx which you can
  • 30:42 - 30:46
    install on your PC. You can download
    it from Github. Or if you just want
  • 30:46 - 30:50
    an easy decompile you go to
    an online decompilation service.
  • 30:50 - 30:54
    They say: “Please only use it for
    legitimate purposes”, but we do!
  • 30:54 - 31:00
    And yesterday Sec was very annoyed
    by the Adblocker blocker they have.
  • 31:00 - 31:04
    But if you ignore that then it’s
    very easy to just upload an APK,
  • 31:04 - 31:08
    get back the source code. And then,
    basically, you have Java source
  • 31:08 - 31:16
    which you can read, you can search,
    you can grep… Oh! You can grep.
  • 31:16 - 31:21
    So. We were looking for AES!
    laughter
  • 31:21 - 31:31
    applause
  • 31:31 - 31:35
    Yeah, everybody is laughing at that
    slide. But there’s 2 things to mention.
  • 31:35 - 31:39
    First of all this is not all of our
    research. This is just the beginning.
  • 31:39 - 31:43
    Then it became difficult. The other
    thing is this key of course is very silly.
  • 31:43 - 31:47
    They actually use 01 to 15
    as an AES encryption key.
  • 31:47 - 31:51
    But if they would have used a real random
    pre-shared key I still would have found it
  • 31:51 - 31:55
    that way. So, actually, it’s not really
    less secure. It’s just possibly left over
  • 31:55 - 32:00
    from development. I have no idea
    why you would use that key! But still
  • 32:00 - 32:03
    – even a better key, I would have found
    it in the source code. Because it’s
  • 32:03 - 32:07
    a pre-shared key. The lock knows it.
    The app knows it – has to know it
  • 32:07 - 32:11
    because it’s pre-shared. So, yeah…
    But still it’s very funny that they have
  • 32:11 - 32:16
    this silly key in there. And we were
    actually wondering quite a lot:
  • 32:16 - 32:20
    “Oh, but what blockchaining mode
    do they use? How do they use AES?
  • 32:20 - 32:24
    Is there an initialization vector?”.
    I don’t know.
  • 32:24 - 32:29
    Took us quite a while until we realized:
    it’s simply just one block! If we use
  • 32:29 - 32:35
    that thing that we sniffed earlier
    and just run one AES decryption
  • 32:35 - 32:40
    with the key 0001 etc. we get something
  • 32:40 - 32:44
    which includes our 42 numbers. Oh!
    Our ‘random’ numbers turn up!
  • 32:44 - 32:49
    How are the chances for that? No.
    So, actually this key decrypted the thing
  • 32:49 - 32:53
    we got from the wire. So we thought:
    “Success!” and NOKE is cracked!
  • 32:53 - 32:56
    Unfortunately it only worked for the
    first 2 messages, and all we saw
  • 32:56 - 33:00
    in these 2 messages is our ‘random’
    number, and in the answer
  • 33:00 - 33:04
    another obviously real random number,
    because we didn’t patch the lock.
  • 33:04 - 33:10
    The next messages from that on
    again were completely scrambled.
  • 33:10 - 33:15
    So we had to do some
    more reverse-engineering.
  • 33:15 - 33:21
    Unfortunately, or fortunately – to make
    it a little more interesting for us –
  • 33:21 - 33:25
    this APK from NOKE doesn’t
    only include the Java source.
  • 33:25 - 33:29
    It has some shared object files.
    So, binaries, which are compiled
  • 33:29 - 33:34
    with some other compiler, probably C.
    Luckily those were in there for Android,
  • 33:34 - 33:38
    for multiple architectures. And one of
    those – I don’t know who is using Android
  • 33:38 - 33:44
    on x86, but obviously it exists – so
    we had all the libraries also in x86.
  • 33:44 - 33:48
    Which we could run through a commonly
    available disassembler. I started doing
  • 33:48 - 33:52
    this object dump, and things (?) a little
    bit. But it’s really hard to read, and
  • 33:52 - 33:57
    you don’t come so far with it. So,
    big thanks again to Sec and to e7p
  • 33:57 - 34:01
    who helped me a lot during Easterhegg
    this year, which was a quite nice event,
  • 34:01 - 34:06
    where we did some lock hacking. And they
    were staring with me at IDA Pro dumps
  • 34:06 - 34:12
    all the time to find the key exchange,
    and finally, it worked out.
  • 34:12 - 34:16
    So, all the assembler is very hard
    to read, I think. But we see there’s
  • 34:16 - 34:21
    a parseCmd function we found.
    Actually they had the labels in there!
  • 34:21 - 34:24
    Which again is not the vulnerability,
    it just made it easier for us
  • 34:24 - 34:30
    to spot the stuff. I don’t think
    that’s bad from them. It’s okay.
  • 34:30 - 34:35
    So we found this parseCmd. It actually
    calls an AES decrypt function.
  • 34:35 - 34:40
    It gets a little bigger and bigger
    and bigger. There we find
  • 34:40 - 34:44
    – I actually can’t read it from here very
    good – this was the Create Session key.
  • 34:44 - 34:49
    This sounds very promising. It was
    called ‘CreateSessionKey’. Hm.
  • 34:49 - 34:54
    Might have something to do with the things
    we saw before. And it has this in a loop.
  • 34:54 - 34:58
    And this loop is actually something people
    could understand if they can read some
  • 34:58 - 35:03
    x86 assembler. It’s a loop of
    4 iterations. And it’s XORing values
  • 35:03 - 35:09
    from one array to another.
    So it’s basically XORing 4 values.
  • 35:09 - 35:14
    And this is the core component of the key
    exchange. This is the 4 byte numbers
  • 35:14 - 35:20
    that we saw earlier. My 42 42 42 42…
    and the other one coming from the lock,
  • 35:20 - 35:25
    are XORed together, and then there’s
    some more magic done. So basically
  • 35:25 - 35:29
    the app sends a random number to the lock,
    the lock sends a random number to the app.
  • 35:29 - 35:34
    And from that there’s a session
    key calculated by adding XOR
  • 35:34 - 35:40
    of these 2 numbers to the
    middle of the original key.
  • 35:40 - 35:45
    So you have this original
    key which we saw before.
  • 35:45 - 35:49
    And you add this result onto it. So.
  • 35:49 - 35:54
    We saw from the app our 42 44 42.
    Of course if you have the real app
  • 35:54 - 35:59
    running that would be still real random.
    But this doesn’t make a difference.
  • 35:59 - 36:02
    It just was easier for us to see
    it’s the same every time, so…
  • 36:02 - 36:06
    It helped a little bit, but not too much.
    So the lock sends the key, those 2 values
  • 36:06 - 36:13
    are XORed together; and then they are
    added onto this silly pre-shared key.
  • 36:13 - 36:17
    I don’t know why they’re doing that!
    I mean, they could have at least added it
  • 36:17 - 36:21
    to different parts of it, and they
    would have more entropy in it, or…
  • 36:21 - 36:24
    I’m not sure who sits in the cell and
    does some coding, and thinks:
  • 36:24 - 36:30
    “This is a good key exchange!”?
    You can’t really look into these minds.
  • 36:30 - 36:34
    But okay, so, we can do something
    in our head. We see here is 0xFD,
  • 36:34 - 36:39
    we add 0x05 to it. So it rolls over. This
    is why here’s the Modulo operation.
  • 36:39 - 36:44
    And get the 0x02. We have 0xBB
    here. We add 0x06 to 0xBB.
  • 36:44 - 36:49
    If you can calculate hex you see it comes
    to 0xC1. Etc. So everything that changed
  • 36:49 - 36:56
    in the key is the middle 4 bytes.
    Which is actually another vulnerability.
  • 36:56 - 37:00
    Because it means even if for some reason,
    which I really can’t imagine because
  • 37:00 - 37:04
    this exchange is done everytime you
    open your lock. It’s not something done
  • 37:04 - 37:09
    on the first time or done once per phone
    or something. Everytime somebody opens
  • 37:09 - 37:12
    this NOKE this whole sequence is run
    through. It connects to the lock, sends
  • 37:12 - 37:19
    a random number, receives a random number,
    the session key is calculated, and using
  • 37:19 - 37:24
    the new session key the rest of the
    communication is done. But just in case
  • 37:24 - 37:27
    you did miss the first packets for some
    reason: if you have a real attack scenario
  • 37:27 - 37:31
    where you can’t replay it it might happen
    that it’s scrambled. Then it’s still
  • 37:31 - 37:34
    4 bytes changed in the key, so we can
    brute-force the new key. By knowing
  • 37:34 - 37:39
    the old one and brute-forcing those
    4 bytes. So I think that’s doable
  • 37:39 - 37:43
    on a modern machine without
    bigger problem. So really,
  • 37:43 - 37:48
    not the cleverest key exchange.
    But even if it would be better
  • 37:48 - 37:51
    it wouldn’t really help. Because there’s
    no asymmetric crypto in it, there’s
  • 37:51 - 37:55
    nothing preventing us from following it.
    If you exchange a session key
  • 37:55 - 37:59
    over a pre-shared secret, somebody
    knowing the pre-shared secret
  • 37:59 - 38:03
    will always be able to follow it.
    So, they have to do some big changes
  • 38:03 - 38:08
    there to make it proof against sniffing.
  • 38:08 - 38:13
    We have this new session key and of course
    we have to verify what is happening.
  • 38:13 - 38:19
    We have the next message on our
    wire. We’re decoding it with the new
  • 38:19 - 38:22
    – very cool – key we have. And we
    get something that doesn’t look
  • 38:22 - 38:26
    completely random. We do it with multiple
    ones and see some structure in it.
  • 38:26 - 38:31
    It’s always… strange guttural noises
    I think I pasted the wrong thing here,
  • 38:31 - 38:36
    actually. Very sorry for that. You have
    to imagine a different message here.
  • 38:36 - 38:40
    Encrypt that using that key and you
    would see what would be up here.
  • 38:40 - 38:44
    But here would be this random we got
    from the air. We de-crypt it with that,
  • 38:44 - 38:50
    and get this. And this dissects into an
    op code which is always at the third byte.
  • 38:50 - 38:54
    And after the op code we actually see
    the lock key which you remember from
  • 38:54 - 38:59
    one of the first slides – 013755 –
    this is the key from my lock.
  • 38:59 - 39:06
    So we now got the key from the air,
    and have full access to the lock.
  • 39:06 - 39:08
    Bad luck for NOKE.
  • 39:08 - 39:16
    applause
  • 39:16 - 39:20
    So 06 is just one of the op codes. When
    you browse through the Java source
  • 39:20 - 39:26
    you see much more op codes that might
    happen. So e.g. there’s the Rekey option
  • 39:26 - 39:31
    which you send to the lock, and the lock
    starts to re-key to regenerate the key,
  • 39:31 - 39:35
    send back the new keys. You can
    unlock – which is what we just saw.
  • 39:35 - 39:39
    Get the battery level. Set a new Quick
    Opening Code. Can reset the lock.
  • 39:39 - 39:43
    Can do a firmware update. That looks
    promising! I have the idea, we will see
  • 39:43 - 39:49
    this op code in the near future.
    And you can enable ‘key fob’
  • 39:49 - 39:53
    which a small device is which you can
    use to open the lock without a phone.
  • 39:53 - 39:57
    So you can send commands
    to pair those, and add them,
  • 39:57 - 40:01
    and get locks of this (?). So this is just
    a few, we haven’t played with all of them.
  • 40:01 - 40:05
    The SetQuickCode,
    I think I sniffed a few…
  • 40:05 - 40:09
    Yeah, but that’s basically the things you
    can do, and you can decode all of them
  • 40:09 - 40:12
    with the message shown before.
  • 40:12 - 40:16
    So some history of
    the vendor notification.
  • 40:16 - 40:20
    We did this on the Easterhegg [2016].
    Everybody knows Easterhegg is Easter.
  • 40:20 - 40:23
    So this was in April [2016].
    Possibly it wasn’t
  • 40:23 - 40:27
    the best idea to send
    them on April, 1st. But…
  • 40:27 - 40:29
    laughter
  • 40:29 - 40:35
    No, they replied and took it seriously. So
    they actually very instantly told us they
  • 40:35 - 40:39
    like the research and everything.
    They knew their crypto isn’t perfect,
  • 40:39 - 40:42
    but the product has to get out. And they
    were working on a new protocol, they sent
  • 40:42 - 40:48
    a few details of that. We don’t have full
    details so far, so we can’t really tell
  • 40:48 - 40:53
    if the new protocol is very good. But
    it looked, from the idea, a little better.
  • 40:53 - 40:57
    They’re bringing out a Bike U-lock which
    is not out yet. And it’s supposed to have
  • 40:57 - 41:01
    the new protocol from shipping.
    We will see. A thing which I found
  • 41:01 - 41:06
    very funny is I downloaded a new [NOKE] app
    in November, and it has a major update
  • 41:06 - 41:11
    in the screen: the ‘Rekey’
    button is now hidden!
  • 41:11 - 41:14
    So, remember, that’s the only button
    which saves you from someone
  • 41:14 - 41:17
    you shared a lock to, to lock him out.
    So this button now is hidden.
  • 41:17 - 41:21
    Possibly not the best idea. Possibly
    people weren’t understanding it.
  • 41:21 - 41:25
    But it can be enabled in the ‘Advanced
    Settings’ menu. So, no problem.
  • 41:25 - 41:29
    But they just recently told me that
    they’re planning to actually fix that
  • 41:29 - 41:33
    in January. So we’re actually
    really in a Zeroday here.
  • 41:33 - 41:38
    So the locks are still vulnerable.
    But 8 months, sorry… I…
  • 41:38 - 41:42
    the conference is now, we couldn’t
    change that! laughter
  • 41:42 - 41:53
    Ray laughs
    applause
  • 41:53 - 41:58
    If you use such a NOKE lock I still
    want to say I like the hardware.
  • 41:58 - 42:02
    It’s quite a nice hardware. Possibly
    write an open source firmware for it,
  • 42:02 - 42:05
    build your own crypto, during
    the time. Or just don’t use it
  • 42:05 - 42:09
    for real valuable things. Or use your
    Aluburka or other shielding while
  • 42:09 - 42:15
    opening it, I don’t know. But just be
    aware if someone sniffs your communication
  • 42:15 - 42:19
    using his 5 Dollar dev board
    he probably knows your codes.
  • 42:19 - 42:25
    So, yeah. So much for the NOKE.
    This is not really the end, it’s just
  • 42:25 - 42:32
    the beginning of the end section. Because
    we still have one mechanical bypass left.
  • 42:32 - 42:37
    You remember that earlier I mentioned
    also the Master Lock doesn’t have
  • 42:37 - 42:42
    no mechanical bypass that we found. If you
    remember Chaos Communication Congress
  • 42:42 - 42:45
    4 years ago – you can remember from
    the Rocket standing exactly here –
  • 42:45 - 42:48
    points to picture on slide we did
    a presentation on this first Bluetooth…
  • 42:48 - 42:53
    not Bluetooth, on this first electronic
    padlock by Master Lock, where we had
  • 42:53 - 42:56
    a nice mechanical magnet attack,
    which was found by Michael Hübler
  • 42:56 - 43:02
    by very cleverly drilling a hole,
    observing the motors, acting with magnets…
  • 43:02 - 43:08
    and found this special move
    which opens the old Master Lock.
  • 43:08 - 43:11
    And we reported that back then.
    So 4 years ago we told Master Lock:
  • 43:11 - 43:16
    “Oh, your padlock can be opened
    with a magnet, this is not very good”.
  • 43:16 - 43:22
    But this was a 30 Dollars padlock, and…
    oh my god, could be done with a magnet.
  • 43:22 - 43:25
    So this is the new one, and they changed
    something. Actually it’s something they
  • 43:25 - 43:31
    told us back then that they’re planning
    to do. They added a shielding metal.
  • 43:31 - 43:37
    So, this very big, thick shielding
    here which I would use to block
  • 43:37 - 43:43
    all the radiation from whatever
    it is, around half of the motor
  • 43:43 - 43:49
    is supposed to help. Let’s have a look.
  • 43:49 - 43:53
    silent video starts
    So this is the Master Lock.
  • 43:53 - 43:56
    We have a bigger magnet. I have to admit
    you see it’s a much bigger magnet.
  • 43:56 - 44:03
    Those magnets are illegal to possess
    all over Germany, I hope, soon!
  • 44:03 - 44:06
    And we have a different move. We’re
    now rotating the magnet. We were
  • 44:06 - 44:10
    shifting it before. – And it’s open!
  • 44:10 - 44:25
    laughter and applause
  • 44:25 - 44:28
    This also is not really Zeroday because
    as you saw before on the slide
  • 44:28 - 44:34
    by Rose & Ramsey he also told
    the Master Lock is unpickable.
  • 44:34 - 44:38
    And after the talk at DEF CON I, in
    the Q&A section somehow mentioned
  • 44:38 - 44:43
    that I doubt that. I didn’t tell
    what to do exactly because
  • 44:43 - 44:47
    I wanted to give Master Lock some
    response time. But directly after the talk
  • 44:47 - 44:51
    somebody approached me: “That’s very
    interesting, I’m with Master Lock!” laughs
  • 44:51 - 44:53
    laughter
    And I actually showed him this and he
  • 44:53 - 44:59
    filmed it with his mobile phone.
    So I consider the vendor notified!
  • 44:59 - 45:10
    laughs
    laughter and applause
  • 45:10 - 45:13
    So I would say: “Works for me!”
  • 45:13 - 45:20
    laughter and applause
  • 45:20 - 45:25
    So I have a message to all these vendors
    and kickstarters and lock makers:
  • 45:25 - 45:29
    “Don’t try to be smart, be smart!
    And disclose your crypto protocols!”
  • 45:29 - 45:32
    There’s really no need to make
    a secret crypto protocol. And if
  • 45:32 - 45:36
    your development department tells
    you: ”No no, we can’t disclose that,
  • 45:36 - 45:39
    that’s a really silly idea to disclose our
    crypto!” you probably have bad crypto,
  • 45:39 - 45:43
    and they know it!
    laughter
  • 45:43 - 45:47
    And, of course, if you build a new
    thing like a hardware, like a lock e.g.
  • 45:47 - 45:52
    try to get your hardware in the hands of
    experienced lockpickers, or locksmiths.
  • 45:52 - 45:55
    The shimming bypass, of the
    Dog & Bone padlock, really,
  • 45:55 - 45:58
    every locksmith in the
    U.S. would have told them:
  • 45:58 - 46:05
    “You can’t build a 100 Dollar padlock
    which can be shimmed with a soda can!”
  • 46:05 - 46:08
    Especially if you’re an electronics
    company what those Dog & Bone people
  • 46:08 - 46:11
    obviously are: Don’t trust on your
    electronics knowledge. The hardware
  • 46:11 - 46:16
    also has to work. And please, if you give
    this hardware to people don’t try to get
  • 46:16 - 46:19
    any NDA’s, or “Oh you can’t disclose”
    – because then they won’t do it, and
  • 46:19 - 46:24
    you will wait just for the product to come
    out, and disassemble it then. So really…
  • 46:24 - 46:29
    Actually, I must say the
    NOKE people which I…
  • 46:29 - 46:33
    the lock isn’t working that good but
    I think the company is doing quite well.
  • 46:33 - 46:36
    They sent us one of their
    locks for mechanical analysis
  • 46:36 - 46:41
    after our Master Lock presentation.
    So we tested their lock
  • 46:41 - 46:44
    on our magnetic attack and that didn’t
    work. And still doesn’t work. So
  • 46:44 - 46:47
    that thing they did good. The other thing
    is that they didn’t get the crypto right.
  • 46:47 - 46:50
    But okay. People are learning.
    some laughter
  • 46:50 - 46:54
    So if someone really wants to be smart
    – and we also tried to tell that [to] NOKE
  • 46:54 - 46:57
    in the kickstarter campaign –
    try to become the first one.
  • 46:57 - 47:01
    And this is really ‘WTF’. Why is
    there no – at all – open source lock?
  • 47:01 - 47:06
    Or light bulb? Or vibrator?
    I have no idea. But…
  • 47:06 - 47:09
    I think you want to sell the hardware! Why
    don’t make the software open source
  • 47:09 - 47:11
    and make it auditable?
  • 47:11 - 47:22
    applause
  • 47:22 - 47:26
    Oopf… What’s that slide? Oh
    yeah, there’s Hacker Jeopardy!
  • 47:26 - 47:30
    If you want Hacker Jeopardy to happen
    next year please send content!
  • 47:30 - 47:36
    laughs
    applause and cheers
  • 47:36 - 47:40
    I heard from that Sec guy and that
    Ray guy that they’re really old,
  • 47:40 - 47:43
    and they don’t know the things that the
    young generation wants to have asked
  • 47:43 - 47:47
    in a Jeopardy. And what Pokémons
    you have to ask, and stuff like that…
  • 47:47 - 47:51
    So send a few ideas! There’s a German
    page, but Hacker Jeopardy will be German
  • 47:51 - 47:55
    next year. So, sorry for that. A German
    page which tells you how to submit ideas,
  • 47:55 - 47:59
    how to make good ideas. And if you
    send enough content possibly next year
  • 47:59 - 48:04
    there will be Hacker Jeopardy, again.
  • 48:04 - 48:10
    applause
  • 48:10 - 48:14
    So, we have some links. Actually, this
    is the Zeroday tool we are releasing,
  • 48:14 - 48:19
    by e7p. It’s not on there yet, I think.
    Or possibly he’s sitting in the audience
  • 48:19 - 48:24
    and uploading it right now. It’s a small
    Python script. It needs Python3.
  • 48:24 - 48:28
    And it implements this crypto session
    exchange. So what you basically do is
  • 48:28 - 48:32
    you get the values from your Wireshark,
    which is all these Hex strings,
  • 48:32 - 48:36
    put them to a file, start the
    decode-NOKE tool and it will tell you
  • 48:36 - 48:40
    what keycode is in there, what things are
    set. Currently it only supports, I think,
  • 48:40 - 48:44
    the ‘Open’ command mainly, and the
    ‘Read Battery’ possibly. But we’ll try
  • 48:44 - 48:48
    to add a few more codes as we decode them.
    But it’s enough to get the lock code
  • 48:48 - 48:52
    from the air. So with this tool
    – but you could implement it yourself –
  • 48:52 - 48:57
    you easily can crack the locks.
    And there’s a blog entry by MH
  • 48:57 - 49:00
    who did a nice paper about the NOKE’s
    hardware and everything. If you really
  • 49:00 - 49:04
    want to look inside the lock look at this.
    And then there’s of course the link
  • 49:04 - 49:08
    to the Nordic RF sniffer software.
  • 49:08 - 49:13
    This is one of the decompilers which
    has the Adblocker blocker on it.
  • 49:13 - 49:16
    And there’s an article from Sec’s blog
    telling you how to decompile and recompile
  • 49:16 - 49:22
    an app. Which I found quite
    helpful during the working.
  • 49:22 - 49:26
    So okay. So, thanks for listening.
  • 49:26 - 49:30
    Please, if you have smart things
    around, and want to play with that,
  • 49:30 - 49:35
    I have one of these dev boards left. So
    I have 2, one for me and one I can lend
  • 49:35 - 49:40
    to someone who wants to sniff to his/her
    hardware. Come to the MuCCC assembly
  • 49:40 - 49:46
    and tell me what you want to attack,
    and I’ll give you my RF sniffer board.
  • 49:46 - 49:50
    Or leave the things there, and we play
    during Congress. Not today, possibly,
  • 49:50 - 49:53
    but tomorrow I’ll be in the assembly, or
    someone will be there. And I think
  • 49:53 - 49:58
    now I have basically exactly 10 minutes,
    and I hope there are some questions.
  • 49:58 - 50:00
    Otherwise I was too quick! Thank you!
  • 50:00 - 50:11
    applause
  • 50:11 - 50:14
    Herald: leise: Hallo! Mikro wär’ schön!
    Rufender: Musst’ nur anmachen!
  • 50:14 - 50:17
    Herald: Is an!
    Ray: He wants a microphone for the questions!
  • 50:17 - 50:19
    Herald is told how to switch on microphone
  • 50:19 - 50:22
    Herald: Hah, wer lesen
    kann ist klar im Vorteil!
  • 50:22 - 50:27
    Ray, thank you very much!
    Do you have some time later?
  • 50:27 - 50:31
    I might need to ask a favour! Did I told
    you about that friend that I’m having
  • 50:31 - 50:37
    with the Bluetooth enabled coffee
    machine? We, we speak later!
  • 50:37 - 50:41
    We have some questions, and we have some
    questions from the internet. So here we go!
  • 50:41 - 50:44
    Signal Angel: Yes, thank
    you. Ray, are you aware
  • 50:44 - 50:48
    of any secure Bluetooth locks?
    With decent crypto?
  • 50:48 - 50:52
    Ray: Actually… not! What I can’t tell is
  • 50:52 - 50:57
    if the crypto of the Master Lock, or
    the crypto of the Dog & Bone are good,
  • 50:57 - 51:02
    because we really haven’t looked into
    it. But it wouldn’t really help because
  • 51:02 - 51:06
    the hardware is broken. The NOKE people,
    as I said, are bringing out a new firmware
  • 51:06 - 51:11
    in January [2017]. I’ll try to make them
    tell me what they’re doing. Because
  • 51:11 - 51:15
    I’m not really going to reverse-engineer
    it again. I do that for a vendor once.
  • 51:15 - 51:18
    We don’t have to do it a second time. So I
    hope they just tell me what they’re doing,
  • 51:18 - 51:22
    and we can have a look if it looks
    promising. But at least they react.
  • 51:22 - 51:26
    So, possibly, the NOKE is becoming a
    more secure padlock. But besides that
  • 51:26 - 51:31
    I don’t know any, so far. You can find the
    talk by Rose & Ramsey on the internet.
  • 51:31 - 51:36
    It’s unusual for DEF CON talks but this
    DEF CON talk is online. So you see lots of
  • 51:36 - 51:39
    locks there which he attacked, and they
    all were worse than the ones we had here.
  • 51:39 - 51:44
    So, sorry, no. Which I could recommend.
  • 51:44 - 51:46
    And I wouldn’t recommend it, anyway,
    because if it’s not open source you
  • 51:46 - 51:51
    don’t know if it’s secure! You just
    know it’s currently uncracked. So,
  • 51:51 - 51:54
    possibly stick to your old ones!
    laughs
  • 51:54 - 51:55
    But thanks for the question.
  • 51:55 - 51:59
    Herald: Then we’re gonna
    hop over to microphone no. 2!
  • 51:59 - 52:03
    Question: Thank you. That was quite
    a bit of ‘Fremdschäming’. Fun talk. (?)
  • 52:03 - 52:07
    Just one thought: You said that
    it’s about selling the hardware.
  • 52:07 - 52:12
    Well, maybe it’s not. Because from what
    I understand most of those devices
  • 52:12 - 52:18
    are cloud-enabled. So I’m pretty
    sure they collect all the data,
  • 52:18 - 52:20
    and maybe it’s about mining
    that, for them. I don’t know.
  • 52:20 - 52:26
    Ray: Actually, yes. The NOKE has a Pro
    version where they sell a company license
  • 52:26 - 52:29
    where you can have a company software
    to the cloud, and have more features like
  • 52:29 - 52:34
    sharing other’s locks. But still you can
    make it open source, and make a license
  • 52:34 - 52:38
    that disallows commercial use, or
    something like that. Open source
  • 52:38 - 52:43
    doesn’t have to mean it’s free to use.
    And if you have very complicated logic
  • 52:43 - 52:48
    for your company portal, or something,
    possibly keep that closed-source.
  • 52:48 - 52:52
    But enable me to follow your
    communication, to understand
  • 52:52 - 52:56
    how keys are generated, and stuff
    like that. This is not your secret.
  • 52:56 - 53:00
    This is something… this
    is the elementary function.
  • 53:00 - 53:03
    People should be able to understand an
    audit. And especially in a commercial
  • 53:03 - 53:07
    environment, if you ask a locksmith
    or some other security expert:
  • 53:07 - 53:12
    “Would you recommend this device?”, if he
    can’t look into it he can’t recommend it.
  • 53:12 - 53:17
    So I think also for selling appliances, or
    selling services open source algorithms
  • 53:17 - 53:23
    or open source protocols would be the best
    solution. But especially in the lock industry
  • 53:23 - 53:26
    that’s very very uncommon. I had
    really bad experience talking to
  • 53:26 - 53:30
    normal lock manufacturers about open
    sourcing their stuff. It’s an idea they
  • 53:30 - 53:34
    don’t understand. They’re about secrets,
    I don’t know. Let’s hope for the future!
  • 53:34 - 53:37
    laughs Another…
    Herald: Okay, we had…
  • 53:37 - 53:41
    No. 1 is just coming up! He was queuing
    at ‘3’ but covering the camera, and then
  • 53:41 - 53:45
    the camera man got a little bit disturbed,
    and… it’s a long story. ‘1’, we go!
  • 53:45 - 53:48
    Question: I was wondering if you knew
    about the new locks which advertise
  • 53:48 - 53:51
    their existence, like broadcast
    things, or things like that?
  • 53:51 - 53:55
    Could you like walk through the street and
    know there are Bluetooth locks around you?
  • 53:55 - 53:59
    Ray: No, those locks usually don’t broadcast
    because it would use too much energy.
  • 53:59 - 54:03
    So usually you have to push the
    shackle of the lock or something.
  • 54:03 - 54:07
    And then it broadcasts. There are actually
    if you go back to this DEF CON talk
  • 54:07 - 54:11
    I was talking about – and I think that’s
    enough shaming of Master Lock here –
  • 54:11 - 54:16
    video playback stops
    if he has door locks and stuff like that,
  • 54:16 - 54:19
    those possibly are connected to [the]
    power [grid] and advertise all the time.
  • 54:19 - 54:23
    So he did some lock wardriving.
    But for the padlocks that doesn’t work.
  • 54:23 - 54:27
    But of course you can go and click
    them, and then… get the idea.
  • 54:27 - 54:31
    And of course you can do the other thing:
    you could walk around and pretend
  • 54:31 - 54:35
    you’re a lock, and see if someone has the
    app running, and connects back to you.
  • 54:35 - 54:37
    That might work!
  • 54:37 - 54:40
    Herald: And over to
    microphone no. 2, please!
  • 54:40 - 54:46
    Question: I was wondering
    about that strong encryption,
  • 54:46 - 54:51
    meaning AES, and on the other
    hand the very weak, or vulnerable,
  • 54:51 - 54:57
    or flawed key exchange: do you
    think that might be due to out-tasking,
  • 54:57 - 55:02
    like they have specified that they
    want encryption, and have not specified
  • 55:02 - 55:06
    how key exchange is to be handled,
    and that might be the reason why
  • 55:06 - 55:11
    it takes them 8 months
    or more to fix that?
  • 55:11 - 55:14
    Ray: This is basically 2 questions.
    Of course I can only speculate.
  • 55:14 - 55:19
    It might be out-tasking, it might
    also be that they just had the time…
  • 55:19 - 55:22
    if you follow the NOKE kickstarter
    campaign – it was all funded
  • 55:22 - 55:26
    in a kickstarter – they had a lot of
    problems in delivering on time.
  • 55:26 - 55:30
    So there’s lots and lots of comments
    “I’m waiting for my lock, oh. Oh god,
  • 55:30 - 55:33
    another delay, now you’re claiming
    manufacturing is difficult…”, so, many,
  • 55:33 - 55:37
    many people saying “you have to come out
    with that”. So it might be time pressure,
  • 55:37 - 55:41
    it might be out-tasking, and of course
    it might be that they just specified:
  • 55:41 - 55:44
    “Oh, we want to use AES”. And that’s
    the other thing, everybody says:
  • 55:44 - 55:48
    “We disclose what we’re using. We’re using
    AES!” Here we have a very good example,
  • 55:48 - 55:52
    yes, it really is using AES. And it’s
    using a correct implementation.
  • 55:52 - 55:57
    We actually found it’s a TI example
    implementation of AES that they’re using.
  • 55:57 - 56:02
    So it’s completely valid AES128,
    but still it’s completely insecure.
  • 56:02 - 56:06
    So people just claim they’re using AES, or
    “We’re using SHA-somesing or somesing”.
  • 56:06 - 56:10
    Isn’t enough. You have to know the whole
    protocol. And that wasn’t the case here.
  • 56:10 - 56:13
    laughs
    Herald: Okay, then we’re gonna go over
  • 56:13 - 56:15
    to the internet, again!
    Ray: The internet… of…
  • 56:15 - 56:19
    Signal Angel: Thank you. Actually it’s a
    follow-up question for the previous one:
  • 56:19 - 56:23
    would it be sufficient to have
    a hardware-accelerated AES
  • 56:23 - 56:25
    on these Bluetooth thingies?
  • 56:25 - 56:30
    Ray: Actually hardware-accelerated AES
    doesn’t have to do anything with that.
  • 56:30 - 56:34
    That might be helpful if you have
    a chip which is a crypto chip,
  • 56:34 - 56:38
    if you have things like side channel
    attacks. If you would have a key fob
  • 56:38 - 56:42
    which has a secret key in it which should
    not be extractable, those keys can be
  • 56:42 - 56:46
    extracted with electronic attacks, side
    channel attacks, power measurements.
  • 56:46 - 56:51
    Against these attacks a crypto chip could
    help because it has a good implementation.
  • 56:51 - 56:55
    But for this… AES is AES. As I said
    the implementation of AES is valid.
  • 56:55 - 56:59
    So an accelerated chip wouldn’t help.
    And they’re not doing bad crypto
  • 56:59 - 57:03
    for performance reasons. It’s only one
    AES operation. They’re doing it because
  • 57:03 - 57:07
    it’s more difficult to do it right. And it
    possibly would need asymmetric crypto.
  • 57:07 - 57:09
    That could need acceleration,
    on the other hand.
  • 57:09 - 57:12
    But it doesn’t have to do with the chip.
  • 57:12 - 57:15
    Herald: Are you queuing there, on ‘5’?
    lowered voice: Well, then here we go!
  • 57:15 - 57:21
    Question: Okay, two little questions,
    more hardware related. First one:
  • 57:21 - 57:25
    How could you build a lock which
    isn’t susceptible to the attack
  • 57:25 - 57:29
    you showed in the video,
    like flipping the magnet?
  • 57:29 - 57:34
    That’s the one, and the second one
    is that Trelock, or ABUS I think,
  • 57:34 - 57:39
    says they have an electronic bike
    lock which doesn’t have any battery,
  • 57:39 - 57:44
    and I’m quite confused how they
    will do it. Have you any idea?
  • 57:44 - 57:48
    Ray: Actually I don’t know – starting with
    the second question – the ABUS lock
  • 57:48 - 57:53
    at all, I must admit. But there are e.g.
    also Cyberlock is it called, they have
  • 57:53 - 57:56
    battery in the key, and you put the key to
    it. If it’s a Bluetooth lock I don’t know
  • 57:56 - 58:00
    how they’re doing it. It might be possible
    that you push something and it starts
  • 58:00 - 58:05
    a generator. I’ve seen buttons which you
    press and they generate the energy to send
  • 58:05 - 58:08
    while you press it. So it might be
    that, but I don’t know the products.
  • 58:08 - 58:11
    The other question, I must admit I didn’t
    really understand what you want to know.
  • 58:11 - 58:15
    Can you repeat the first one?
  • 58:15 - 58:18
    Question: Of course. I was just
    asking how to protect the lock
  • 58:18 - 58:22
    so it can’t be opened by flipping
    a magnet, like you did in the video.
  • 58:22 - 58:26
    Ray: How to protect it, that’s a very
    good question. I think we know
  • 58:26 - 58:30
    how NOKE did it. And the thing is
    I don’t think NOKE did it intentionally.
  • 58:30 - 58:35
    It just happened to be in their design.
    We can’t open the NOKE because
  • 58:35 - 58:39
    the rotating actor they have is also
    magnetic. So if I put my magnet there
  • 58:39 - 58:44
    I lock the lock. In the Master Lock it’s
    some cast metal which is not magnetic.
  • 58:44 - 58:47
    So changing this to magnetic would
    possibly help. Using a completely
  • 58:47 - 58:52
    different approach, like the motor in The
    Quicklock, or which needs more power,
  • 58:52 - 58:55
    or works differently like a servo would
    help. But would be a completely
  • 58:55 - 59:00
    different design. But it’s really a tricky
    part. There have lots of different locks
  • 59:00 - 59:04
    in the past, also door locks, been
    attackable by hardware attacks.
  • 59:04 - 59:11
    So building a good, really good mechanic,
    or electromechanic isn’t easy.
  • 59:11 - 59:15
    Herald: And I think we have time
    for the last one, at microphone 5.
  • 59:15 - 59:19
    Question: So this isn’t a question,
    it’s just a precision. At one point
  • 59:19 - 59:24
    during the presentation you talked
    about open source smart appliances,
  • 59:24 - 59:28
    and you said, nobody really does
    that. And you urge people
  • 59:28 - 59:34
    to be the first to do e.g.
    open source sex toys.
  • 59:34 - 59:39
    And it happens that someone is doing that.
  • 59:39 - 59:43
    So on Github it’s Q-dot,
    if you want to learn more
  • 59:43 - 59:48
    about what they’re doing.
    They have, you know,
  • 59:48 - 59:53
    several public repositories about
    ‘teledildonics’. So, you know, just,
  • 59:53 - 59:56
    if anyone wants to check
    that out, just saying.
  • 59:56 - 59:59
    Ray: Okay, thanks for your
    self-advertisement. laughter
  • 59:59 - 60:03
    And I was mainly talking about locks, I
    must admit. I don’t know the other fields
  • 60:03 - 60:06
    so well. But locks is really difficult
    to get open source. If you have
  • 60:06 - 60:09
    more questions I’ll be at the MuCCC
    assembly. I’m waiting for you to bring
  • 60:09 - 60:14
    devices, get the dev board, hack the
    stuff. And thanks again, for listening!
  • 60:14 - 60:17
    applause
  • 60:17 - 60:22
    postroll music
  • 60:22 - 60:40
    subtitles created by c3subtitles.de
    in the year 2017. Join, and help us!
Title:
Lockpicking in the IoT (33c3)
Description:

more » « less
Video Language:
English
Duration:
01:00:41

English subtitles

Revisions