Difference between revisions of "Summerschool Aachen 2004/Hardware Hacking Lab"

From C4 Wiki
Jump to: navigation, search
(TAMPER Lab work at Cambridge)
Line 31: Line 31:
  
 
=== Locks ===
 
=== Locks ===
 +
 +
If you are interested in lock picking the [http://www.lysator.liu.se/mit-guide/mit-guide.html MIT Guide to Lock Picking] is a good start.
  
 
One of my friends works in [http://www.hmprisonservice.gov.uk/prisoninformation/locateaprison/prison.asp?id=254,15,2,15,254,0 Belmarsh high security prison]. They apparently use keys which have a magnetic combination, since there was a problem where inmates would look at the shape of the original key held by a prison officer and make replacement keys by hand.
 
One of my friends works in [http://www.hmprisonservice.gov.uk/prisoninformation/locateaprison/prison.asp?id=254,15,2,15,254,0 Belmarsh high security prison]. They apparently use keys which have a magnetic combination, since there was a problem where inmates would look at the shape of the original key held by a prison officer and make replacement keys by hand.

Revision as of 17:35, 21 September 2004

Notes from the Lab Session

  • nCipher HSM
  • The Anatomy of an ADSL modem
  • Netgear RT314
  • The Netgear FR314 xDSL Router...

Dismantling the Early Warning System (PEWS) AN/TRS-2(V)

Myself and Ernest dismantled the PEWS detector to find out what it is and how it works. It is a device designed to detect passing vehicles and personnel by using seismic and magnetic detectors, and send this to the receiver. The manual for the system is online.

The detector is weatherproof so it was necessary to remove the sealant to open it. Once opened it contained two main boards, both of which were densely packed with discrete components (resistors, capacitors and transistors). There were a few chips, but based on their datasheets these were very simple (one was a decimal counter, the other contained a few simple logic gates). The serial number of one of these showed that the chip was manufactured in 1981 so that would explain why the system is so basic.

The output of the device can either be sent using wires or radio. There is no means to give the device a key, so the signal must be unencrypted. It probably simply sends the serial number and whether it detects a person or a vehicle. Only two digits of the serial number are shown on the receiver. There doesn't appear to be any attempt to prevent jamming, interception or generation of false signals so it is not that interesting from a security perspective.

There are some photos available on the internal network:
Outside Boards 1 Boards 2 Boards 3

-- Steven Murdoch

Notes from Presentations

TEMPEST

For those interested in TEMPEST attacks and defences, including both radio and optical based techniques, Markus Kuhn's PhD thesis covers this area well, but is long. If you don't want to read all of it, there are shorter papers on Optical TEMPEST and Radio TEMPEST on LCD screens (which also mentions the anti-TEMPEST fonts). There is also an FAQ on Optical TEMPEST.

-- Steven Murdoch

Locks

If you are interested in lock picking the MIT Guide to Lock Picking is a good start.

One of my friends works in Belmarsh high security prison. They apparently use keys which have a magnetic combination, since there was a problem where inmates would look at the shape of the original key held by a prison officer and make replacement keys by hand.

-- Steven Murdoch

Tampering

At Cambridge, the TAMPER Lab does most of the work investigating hardware security. In particular Sergei Skorobogatov's website is worth looking at.

-- Steven Murdoch