Black Hat: Researchers explain how to disable home security systems

Share this article:
The gear that two researchers used to bypass home security systems.
The gear that two researchers used to bypass home security systems.

Two physical security experts demonstrated on Wednesday how they can disable a home or office's security system within minutes by using easy-to-acquire, cost-effective and often basic equipment.

Speaking at Black Hat 2013 in Las Vegas, Drew Porter and Stephen Smith, two senior security researchers at Phoenix-based security consultancy Bishop Fox, explained how it doesn't take much work.

The pair said there are some 36 million home- or office-installed security systems in America. Many of them consist of three basic components: door and window sensors, motion sensors and keypads.

Disabling the first two are fairly easy. Window sensors, depending on how they are constructed, can be undone by magnets or sheet metal. Motion sensors can be turned off, they discovered and demonstrated in a video, by a piece of cardboard or the light from a cigarette lighter. (The researchers attempted to showcase the exploits on stage, but encountered technical difficulties).

The harder piece to immobilize is the keypad. And it's also the most important.

"That's where everything connects to, and it reports out," Porter told the audience of several hundred. 

Key pads, which call out to police if there is a security breach, rely on different data connections to place the alert: usually landline and cellular.

To bypass the pads, the researchers relied on software-defined radio systems – USRP or the cheaper bladeRF (it runs a few hundred dollars) – which essentially jams the signal by sending commands that asks the key pad to latch on to a rogue cell phone network.

"You overpower the system," Porter said. "We pretend to be AT&T, and these devices jump right on it."

That prevents the key pad from calling out to the cops over a cell network. To prevent it from using the landline connection, attackers would need physical access.

The researchers said they are amicably working with affected vendors, whom they would not name. But many other manufacturers that they didn't test are likely susceptible, they said.

"They probably want to look into them, maybe update them," Smith said.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.