Difference between revisions of "Summerschool Aachen 2004/Hardware Hacking Lab"

From C4 Wiki
Jump to: navigation, search
(Added links on TEMPEST)
m
Line 27: Line 27:
  
 
For those interested in TEMPEST attacks and defences, including both radio and optical based techniques, [http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-577.pdf Markus Kuhn's PhD thesis] covers this area well, but is long. If you don't want to read all of it, there are shorter papers on [http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf Optical TEMPEST] and [http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf Radio TEMPEST on LCD screens] (which also mentions the anti-TEMPEST fonts). There is also an [http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html FAQ on Optical TEMPEST].
 
For those interested in TEMPEST attacks and defences, including both radio and optical based techniques, [http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-577.pdf Markus Kuhn's PhD thesis] covers this area well, but is long. If you don't want to read all of it, there are shorter papers on [http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf Optical TEMPEST] and [http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf Radio TEMPEST on LCD screens] (which also mentions the anti-TEMPEST fonts). There is also an [http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html FAQ on Optical TEMPEST].
 +
 +
-- [[Steven Murdoch]]

Revision as of 16:44, 21 September 2004

Notes from the Lab Session

  • nCipher HSM
  • The Anatomy of an ADSL modem
  • Netgear RT314
  • The Netgear FR314 xDSL Router...

Dismantling the Early Warning System (PEWS) AN/TRS-2(V)

Myself and Ernest dismantled the PEWS detector to find out what it is and how it works. It is a device designed to detect passing vehicles and personnel by using seismic and magnetic detectors, and send this to the receiver. The manual for the system is online.

The detector is weatherproof so it was necessary to remove the sealant to open it. Once opened it contained two main boards, both of which were densely packed with discrete components (resistors, capacitors and transistors). There were a few chips, but based on their datasheets these were very simple (one was a decimal counter, the other contained a few simple logic gates). The serial number of one of these showed that the chip was manufactured in 1981 so that would explain why the system is so basic.

The output of the device can either be sent using wires or radio. There is no means to give the device a key, so the signal must be unencrypted. It probably simply sends the serial number and whether it detects a person or a vehicle. Only two digits of the serial number are shown on the receiver. There doesn't appear to be any attempt to prevent jamming, interception or generation of false signals so it is not that interesting from a security perspective.

There are some photos available on the internal network:
Outside Boards 1 Boards 2 Boards 3

-- Steven Murdoch

Notes from Presentations

TEMPEST

For those interested in TEMPEST attacks and defences, including both radio and optical based techniques, Markus Kuhn's PhD thesis covers this area well, but is long. If you don't want to read all of it, there are shorter papers on Optical TEMPEST and Radio TEMPEST on LCD screens (which also mentions the anti-TEMPEST fonts). There is also an FAQ on Optical TEMPEST.

-- Steven Murdoch