Author Topic: EEVblog #762 - How Secure Are Electronic Safe Locks?  (Read 90414 times)

0 Members and 1 Guest are viewing this topic.

Offline all_repair

  • Frequent Contributor
  • **
  • Posts: 724
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #75 on: July 07, 2015, 04:55:59 am »
This last video of yours is lacking any scientific information content, it has 0 teaching value.
I thought that the idea of eevblog was of learning about electronics, you know 'real world' electronics, but lately your videos are not about that anymore.
.....

This one exactly not so bad but I have skipped the last few.  For this, I watched from beginning to finish.  There are as much to learn from a failed experiment as from a successful one, if not more.   I kind of think the screw-up was deliberate to add sensation.  It is out of a seasoned engineer habit to pull a cable out for no apparent reason and then does not put it back IMMEDIATELY.
 

Offline miguelvp

  • Super Contributor
  • ***
  • Posts: 5550
  • Country: us
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #76 on: July 07, 2015, 05:09:49 am »
Yeah, glitching the supply might throw the MCU into a path not intended.

Disruption of the power fast enough but not enough to halt/reset the processor but fast enough and at the same 8MHz frequency with a bit of bias might make the MCU skip instructions until you reach the needed code.

Kind of forcing NOPs for n cycles at a time until you reach the unlock code. Once you know the delta (if you can make the MCU to glitch and force a NOP per pulse) then the combination doesn't matter. Or maybe you can glitch the part where it tries to get the code and you can force the MCU to miss the reads from the EEPROM so it gets all 0s.
 

Offline DrGeoff

  • Frequent Contributor
  • **
  • Posts: 794
  • Country: au
    • AXT Systems
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #77 on: July 07, 2015, 05:24:09 am »
Yeah, glitching the supply might throw the MCU into a path not intended.

One of the attack vectors on smart cards is to inject rubbish on the power supply to force something interresting to happen, at the same time as watching the power supply for current waveforms (smart cards don't have decoupling caps to speak of). Maybe some HF noise or browning the supply around the BOD thresholds to cause rapid resets to occur might show something interesting.
Was it really supposed to do that?
 

Offline fvdpol

  • Newbie
  • Posts: 8
  • Country: nl
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #78 on: July 07, 2015, 07:16:43 am »
The 10 ohm resister used for the current measurement actually reduces your resolution as the decoupling in the circuit will low-pass the cpu glitches. If you can have a much lower source impedance you should be able to see much more detail.

Would be interesting to see how much a micro current adapter (and maybe additionally a lower impedance power source than the 9v battery) would help here. Believe this type of measurement would be THE use-case for a uCurrent :-)
 

Offline BillyD

  • Regular Contributor
  • *
  • Posts: 218
  • Country: ie
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #79 on: July 07, 2015, 07:29:47 am »
The 10 ohm resister used for the current measurement actually reduces your resolution as the decoupling in the circuit will low-pass the cpu glitches. If you can have a much lower source impedance you should be able to see much more detail.

Would be interesting to see how much a micro current adapter (and maybe additionally a lower impedance power source than the 9v battery) would help here. Believe this type of measurement would be THE use-case for a uCurrent :-)

Interesting idea. Would it be able to pass everything through or would you lose, say, the very high frequency current changes?

 

Online Fungus

  • Super Contributor
  • ***
  • Posts: 17225
  • Country: 00
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #80 on: July 07, 2015, 07:50:03 am »
Believe this type of measurement would be THE use-case for a uCurrent :-)
The maker of the uCurrent doesn't actually use it!  :-DD


(Seriously though, he was only looking at timing, not current usage...current usage would be attack #2)
 

Offline mikeselectricstuff

  • Super Contributor
  • ***
  • Posts: 13997
  • Country: gb
    • Mike's Electric Stuff
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #81 on: July 07, 2015, 07:52:30 am »
As there didn't seem to be an 'enter' key, I wonder if it is simply testing the last 6 digits entered on each keypress, possibly with a timeout.
If the code isn't written well, the length of time it stays awake after a keypress may be proportional to how many correct digits there are.
Youtube channel:Taking wierd stuff apart. Very apart.
Mike's Electric Stuff: High voltage, vintage electronics etc.
Day Job: Mostly LEDs
 

Offline mikeselectricstuff

  • Super Contributor
  • ***
  • Posts: 13997
  • Country: gb
    • Mike's Electric Stuff
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #82 on: July 07, 2015, 07:54:26 am »
I wonder if the case is electrically bonded to the supply -ve, if not, then there may be scope for common-mode spike injection.
Youtube channel:Taking wierd stuff apart. Very apart.
Mike's Electric Stuff: High voltage, vintage electronics etc.
Day Job: Mostly LEDs
 

Offline f4eru

  • Super Contributor
  • ***
  • Posts: 1114
  • Country: 00
    • Chargehanger
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #83 on: July 07, 2015, 09:23:25 am »
Quote
To put it simple, your videos became the cat videos of electronics
Hell No! These are the "cat" videos of electronics :




Offline ale500

  • Frequent Contributor
  • **
  • Posts: 415
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #84 on: July 07, 2015, 09:40:45 am »
"Always be careful with your tools"  :-DD :-DD :-DD :-DD :-DD :-DD :-DD :-DD That was great :)
 


Offline EEVblogTopic starter

  • Administrator
  • *****
  • Posts: 38713
  • Country: au
    • EEVblog
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #86 on: July 07, 2015, 10:26:38 am »
I kind of think the screw-up was deliberate to add sensation.

You wouldn't think that if you heard my four letter expletives because:
a) I was so stupid
and
b) I wasn't going to get the video out on the Friday.
and
c) Had to ask the wife for work time on the weekend in order to fix the screw-up.
 

Offline EEVblogTopic starter

  • Administrator
  • *****
  • Posts: 38713
  • Country: au
    • EEVblog
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #87 on: July 07, 2015, 10:28:07 am »
One of the attack vectors on smart cards is to inject rubbish on the power supply to force something interresting to happen

Smart cards don't have a bunch of power supply rail stuff to screw things up.
 

Offline EEVblogTopic starter

  • Administrator
  • *****
  • Posts: 38713
  • Country: au
    • EEVblog
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #88 on: July 07, 2015, 10:28:51 am »
The maker of the uCurrent doesn't actually use it!  :-DD
(Seriously though, he was only looking at timing, not current usage...current usage would be attack #2)

Correct. Not everyone has a uCurrent, so I wanted to see what was visible with just a resistor first.
 

Offline rr100

  • Frequent Contributor
  • **
  • Posts: 339
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #89 on: July 07, 2015, 11:09:51 am »
Not wishing to derail this topic, but that's actually true and I verified it on my Lexmark scanner a couple of years ago. It got about one third of the way through a ten Euro note before packing it in. I can't remember exactly what error message it gave, although I think it did spell out that it had detected currency.

For printers most likely it is in the drivers, especially for cheap one. Now for color copiers, that's another story.
Even way back (I think around 2001 or so) Painshop Pro (and probably some other programs) wouldn't even copy/paste from a picture of euro's or dollars.
 

Offline rr100

  • Frequent Contributor
  • **
  • Posts: 339
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #90 on: July 07, 2015, 11:10:33 am »
Then to the end you say: "Even if we could find the 6 right digits, we don't know the order"
I'd say that depends on how good/poorly they have programmed the software: Say it is kind of an if/else hierarchical thing:

This is precisely what I was thinking as well.
 

Offline EEVblogTopic starter

  • Administrator
  • *****
  • Posts: 38713
  • Country: au
    • EEVblog
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #91 on: July 07, 2015, 11:17:39 am »
Then to the end you say: "Even if we could find the 6 right digits, we don't know the order"
I'd say that depends on how good/poorly they have programmed the software: Say it is kind of an if/else hierarchical thing:
This is precisely what I was thinking as well.

Well yeah, if there is some kind of vulnerability that lets you get at the actual correct sequence, of course. I wasn't testing for that exploit in this video.
 

Offline rr100

  • Frequent Contributor
  • **
  • Posts: 339
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #92 on: July 07, 2015, 11:33:18 am »
This was a fantastic video, I wasn't expecting at all to be able to do it "laparoscopily". I've done my fair share of "remote manipulations" with tweezers and screwdrivers but I was just sure this will end up in sparks (from some kind of saw).

Speaking about the old "studio" ... I watched video Nr 3 I think a few days ago and it looks now .... like Star Trek TOS! NOT like it's coming from the future but from the 60's! Not that there is any criticism, I watched many of the old ones when they were new and they were ok, going to the newer fancy ones again ok, now going back it is like AUCHOMFGWTF!?!
 

Offline 84GKSIG

  • Regular Contributor
  • *
  • Posts: 58
  • Country: au
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #93 on: July 07, 2015, 12:02:50 pm »
Yikes why so much negativity, ive not been on here in a while and seems like a bunch of you guys are in attack mode, why? whats happened?

I was thinking any way, is the safe considered to be a massive RF shield? if not could you in theory wrap a loop of copper wire around the safe to use as a pick up for microprocessor noise ?

EDIT: is the safe magnetically shielded ?

and also the solenoid pin is magnetic? couldnt you use a cleverly placed high current electromagnet to pull the pin back ? or even induct a burst of current into the solenoid coil ? wouldnt expect any of this work work either but its just for a laugh, if i had one id be trying hell basic stuff. awesome work getting that connector back on through the holes you drilled in the bottom i was cheering with you when you got em back on  :-DD
« Last Edit: July 07, 2015, 12:07:37 pm by 84GKSIG »
 

Offline tszaboo

  • Super Contributor
  • ***
  • Posts: 7948
  • Country: nl
  • Current job: ATEX product design
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #94 on: July 07, 2015, 12:17:02 pm »
Very entertaining episode! I wonder if the programmers thought of the power line attack. Because I believe it is quite easy to write code which would prevent this:
Wait for 6 keypress
Read out EEPROM
Decrypt EEPROM data. Now this can be quite simple, for example XOR it with 0x55 to get the actual code in BCD. If you power line attack it, you would never guess.
If code is wrong, do stuff A (save timeout to eeprom or something)
If code is right, do stuff B (open door)

You need 6 keypress for anything remotely important to happen, and even then, if you get the wrong code always, you don't know what to look for.
The meaning of save codes, that nothing out of the ordinary happens if you press the wrong button. Why would be the firmware any different?
 

Online Fungus

  • Super Contributor
  • ***
  • Posts: 17225
  • Country: 00
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #95 on: July 07, 2015, 01:08:40 pm »
EDIT: is the safe magnetically shielded ?
It's a big piece of steel, so.... "yes".

 

Offline Rasz

  • Super Contributor
  • ***
  • Posts: 2617
  • Country: 00
    • My random blog.
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #96 on: July 07, 2015, 01:44:40 pm »
Very entertaining episode! I wonder if the programmers thought of the power line attack. Because I believe it is quite easy to write code which would prevent this:

famous last words
Wait for 6 keypress
Read out EEPROM
Decrypt EEPROM data. Now this can be quite simple, for example XOR it with 0x55 to get the actual code in BCD. If you power line attack it, you would never guess.

all of the above we skip

If code is wrong

this is where attack is happening, how do you compare good code to bad code? you dont have vliw, simd, nor even 32bit alu to make whole comparison in one instruction.

You need 6 keypress for anything remotely important to happen, and even then, if you get the wrong code always, you don't know what to look for.

you dont, attackers do

Yikes why so much negativity

"Im gonna do power analysis" .... doesnt do power analysis(no, looking at the scope at 2 orders of magnitude wrong scale is not it), announces lock is secure
Who logs in to gdm? Not I, said the duck.
My fireplace is on fire, but in all the wrong places.
 

Offline eneuro

  • Super Contributor
  • ***
  • Posts: 1528
  • Country: 00
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #97 on: July 07, 2015, 02:43:07 pm »
i would be interested to see the internals of the keypad and how the lock communicates with it
I'm more concerned about such thing, that this keypad lack such quite basic feature like.... displaying those digits 0..9 at random order in 3 x 3 matrix, make this display touchable. than if somone tried record owner hitting those 6 numbers using thermal imagining or classic video cam with huge zoom to remeber position where someone hits this keypad, than whatever they do, if next time those 10 digirs 0..9 will be displayed at another random order (TRNG can be used for this, no need to use PRNG on MCU), than position where you press those numbers is worth nothing, since it changes all the time someone attempts to enter this pin code  8)
I wonder, why they didn't made this this way? Even on many web sites this is preffered method to avoid mouse logging or keyboard dumping to takee control over someones account?  ???
Yeah, I don't like this safe lock doesn't have such random numbers placement, but probably it is too cheap or are there as everywhere patene issues which limits manufacturers flexibility who do not want pay too much for patents, so end users gets not the best possible solutions, but something between and still DIY solution can be in many cases better  :-\

Anyway, this hack with driling safe side and using thin USB microscope video to try put this bloody connector inside again was really very creative  :-+


I need to dig at home througth 0.250m -0.500m concrete wall to see closed space in home under stairs and probably this this USB microscope is must to have in my toolbox, especially it can be perfect for my pick & place & reflow PCB machine too, so considering buying something like this below (without useless tripod) but quite cheap, so I think I'll give it a chance-thigs like this can save a lot of frustration one day and... feel like Hollywood epic win compilation star  :-DD
http://microscopes.mobi/product/supereyes-b005-0-1x-200x-handheld-usb-digital-microscope-endoscope-loupe-otoscope-magnifier-with-11mm-tube-diameter-tripod-led/
They claim it works under Linux, too  :blah: We'll see soon...
« Last Edit: July 07, 2015, 02:46:31 pm by eneuro »
12oV4dWZCAia7vXBzQzBF9wAt1U3JWZkpk
“Let the future tell the truth, and evaluate each one according to his work and accomplishments. The present is theirs; the future, for which I have really worked, is mine”  - Nikola Tesla
-||-|-
 

Online Fungus

  • Super Contributor
  • ***
  • Posts: 17225
  • Country: 00
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #98 on: July 07, 2015, 02:45:40 pm »
this is where attack is happening, how do you compare good code to bad code? you dont have vliw, simd, nor even 32bit alu to make whole comparison in one instruction.
You don't need any of that. All you need to is reduce it to a single branch instruction.

eg. Subtract the secret number from the input using as many instructions as you like then there's a single branch-on-zero instruction.

The code path will be identical for all incoming keypresses. The only time there's any difference in the instructions executed is when there's a 'pass' and you're going to open the door.
 

Offline TheAmmoniacal

  • Supporter
  • ****
  • Posts: 1188
  • Country: no
Re: EEVblog #762 - How Secure Are Electronic Safe Locks?
« Reply #99 on: July 07, 2015, 04:33:01 pm »
The easiest way to "crack" this safe must be to do exactly what Dave did when re-inserting the connector - but instead using some wires to power the solenoid directly. I see no reason why you can't just bypass the circuitry altogether and connect 9V on the solenoid? What about trying to power the solenoid from outside with resonant inductive coupling? Overpowered induction charger?
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf