LAS VEGAS--Researchers at the Black Hat security conference here showed today
how they could disrupt and snoop on home automation networks in residences and
offices using devices connected to Ethernet networks that communicate via public
power lines.
Dave
Kennedy and Rob Simon have created a device that can be plugged in to a power
outlet outside a target building or a nearby building and programmed to
interfere with the home Ethernet network inside. The X10 Black wholesale abercrombie
clothing Out device can be programmed to jam the signals that turn lights on
and off and open doors, as well as disable security systems, kill security
cameras, turn air conditioning or heat off, and interfere with other functions
of a home automation network based on the X10 protocol. X10 is one of the most
popular protocols.
They also have developed the X10 Sniffer device,
which can see what appliances and systems are attached to the Ethernet network
and see whether the doors are open and lights are on. "We can track people with
motion sensors and see what part of the house they might be in," Simon said
during a presentation. The sniffer device basically "maps out the entire house,"
said Kennedy, whose hacker handle is "ReL1K."
Home automation systems are
appearing in more and more buildings, computerizing tasks that typically require
moncler
shirts some manual interaction, like turning on lights, or enabling advanced
services, like heating toilet seats. The weaknesses stem from the fact that
there is no encryption in the X10 protocol, said Simon, whose handle is
"Kickenchicken57."
The researchers are a few weeks away from releasing
versions of the devices that would allow an attacker to remotely control the
device via the cellular network, so that it could be plugged in to the outlet
and communicated with from afar, instead of having to preprogram the commands.
The attacker will be able to communicate with the device via text message and
the device will be able to "send text notifications when someone comes into
their house," for example, Simon said.
They are also working on a
sniffer based on the Z-Wave home automation protocol that connects appliances
over a mesh network. That device will be able to sniff and decode the AES
(Advanced Encryption Standard) encryption keys when a new appliance is added to
the network, they said. This would enable an attacker to spoof the Z-Wave basic
controller for the system.
"We're christian louboutin
knockoff trying to bring more exposure to this attack avenue," Kennedy said
when asked why he was revealing the weaknesses and releasing the tools. "This
needs to be incorporated into penetration testing. It is a very real threat
vector."
He said he had not notified any vendors of the flaws yet.
Vendors will eventually need to add encryption to block such attacks, Kennedy
said. "There's virtually no security on these things right now," he said.
The researchers did find one device, a Z-Wave-based door handle, that
had encryption, but it was turned off by default.
Hypponen talked about the
technical complexity of the 2008 virus Mebroot, a trojan that infects the master
boot record of computers and is exceptionally difficult to remove because of it,
and ransomware like GPCode, which holds your computer hostage until you wire
money to the virus writers. Stuxnet, though, was an embarrassment for the
security industry, Hypponen said.
"All this work did not prepare us for
what we found next. It was embarrassing. We missed Stuxnet for a freaking year,"
he said, shaking his head.
"Today ugg boots for women when
you get infected by viruses, you will not know," Hypponen said. "It's running
silently in the background. It won't slow down your system, and it won't take up
too much of your resources."
"It has been a pretty wild ride over the
past 25 years, from Brain to Stuxnet. Many things have changed, many things
haven't changed. Brain didn't spread on the Internet, it didn't exist," Hypponen
said, alluding to the spread by floppy disk. "And Stuxnet spread by USB key."
来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/26147898/viewspace-704397/,如需转载,请注明出处,否则将追究法律责任。