{"id":2676,"date":"2012-10-25T19:19:58","date_gmt":"2012-10-25T23:19:58","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=2676"},"modified":"2021-07-05T16:08:28","modified_gmt":"2021-07-05T20:08:28","slug":"attacking-electronic-door-access-control-systems2","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/attacking-electronic-door-access-control-systems2\/","title":{"rendered":"Attacking Electronic Door Access Control Systems"},"content":{"rendered":"<p><a href=\"https:\/\/www.independent.ie\/business\/technology\/cyber-security-experts-warn-firms-about-dark-side-of-social-media-use-as-hackers-hunt-data-35152737.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-109186 size-medium\" title=\"Attacking Electronic Door Access Control Systems\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-4.jpg?resize=150%2C89&#038;ssl=1\" alt=\"Attacking Electronic Door Access Control Systems\" width=\"150\" height=\"89\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-4.jpg?resize=150%2C89&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-4.jpg?resize=75%2C44&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-4.jpg?resize=768%2C453&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-4.jpg?w=1000&amp;ssl=1 1000w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><em><a title=\"DarkReading\" href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">DarkReading<\/a><\/em> pointed out research by independent security researcher, <a title=\"Shawn Merdinger\" href=\"https:\/\/infocondb.org\/presenter\/shawn-merdinger\" target=\"_blank\" rel=\"noopener noreferrer\">Shawn Merdinger<\/a>, into vulnerabilities within embedded door access control systems. The researcher investigated the inner workings of electronic door access controls (EDAC). Mr. Merdinger disclosed some of his findings at the 2010 <a title=\"Carolinacon conference\" href=\"http:\/\/carolinacon.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">CarolinaCon conference<\/a>.<\/p>\n<p><a href=\"https:\/\/s2sys.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109188\" title=\"S2 Security logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/s2-logo.png?resize=120%2C41&#038;ssl=1\" alt=\"S2 Security logo\" width=\"120\" height=\"41\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/s2-logo.png?resize=150%2C51&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/s2-logo.png?resize=75%2C26&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/s2-logo.png?w=173&amp;ssl=1 173w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a>The <em>DarkReading<\/em> article Attacking Electronic Door Access Control Systems reports that the researcher found several flaws in the <a title=\"S2 Netbox\" href=\"https:\/\/www.s2sys.com\/solutions\/products\/access-control-systems\" target=\"_blank\" rel=\"nofollow noopener\">S2 Security NetBox<\/a>. According to the firm&#8217;s website, more than 9,000 customers in 50 countries worldwide use S2 Security Corporation\u2019s integrated security management platforms. Among the flaws in the system, he found an unauthenticated factory reset and unauthorized access to backup data. The author says the first issue is obviously a pretty serious one that could lead to a potential denial of service, but it\u2019s the last one that turns heads.<\/p>\n<p>According to the CarolinaCon <a title=\"Shawn Merdinger - We Don't Need No Stinking Badges\" href=\"https:\/\/carolinacon.org\/\" target=\"_blank\" rel=\"nofollow noopener\">presentation<\/a>, the backup files are stored in a location with predictable file names that do not need authentication to access. Inside a software dump of the electronic door access control system, an attacker can find goodies like the configuration and something that might come in handy like the administrator\u2019s password hash. From there, the attacker can do pretty much anything he or she wants, including unlocking doors at will.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20140408223043\/http:\/\/www.diabetescare.net\/content_detail.asp?id=446105\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109191\" title=\"door access control system, administrator\u2019s password\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Key_Door_Lock.jpg?resize=100%2C75&#038;ssl=1\" alt=\"door access control system, administrator\u2019s password\" width=\"100\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Key_Door_Lock.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Key_Door_Lock.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Key_Door_Lock.jpg?w=477&amp;ssl=1 477w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>The article further states that Mr. Merdinger found that the door access control database also has the user names, passwords, and IP addresses for the network cameras and digital video recorders (DVRs). Now the attacker can watch the facility, learn traffic patterns, and plan for a physical penetration of the facility. The stolen credentials will allow the attacker to turn off cameras and\/or recordings during their assault on the facility. To make matters worse, Mr. Merdinger points out that marketing folks for these products will actually state that it\u2019s safe to put these management systems on the Internet. And apparently, people do, because in the presentation he demonstrates production systems that are online with a <a title=\"Shodan\" href=\"http:\/\/www.shodanhq.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Shodan<\/a> search.<\/p>\n<p><em>DarkReading<\/em> acknowledges that the presentation doesn\u2019t stop at showing the scary stuff. It takes the next step that most audiences are dying to see, but don\u2019t always get, and that\u2019s how to fix these things as both the vendor and the customer. The blog recommends the video, the detailed paper, and his updated <a title=\"Shawn Merdinger (Security Researcher)\" href=\"https:\/\/web.archive.org\/web\/20160102022101\/https:\/\/conference.hitb.org\/hitbsecconf2010dxb\/index.html%3Fpage_id=733.html\" target=\"_blank\" rel=\"noopener noreferrer\">presentation<\/a> from <a title=\"Hack in the Box\" href=\"https:\/\/web.archive.org\/web\/20161209054457\/http:\/\/conference.hitb.org:80\/hitbsecconf2010dxb\/index.html?\" target=\"_blank\" rel=\"noopener noreferrer\">Hack in the Box 2010<\/a> (in <a title=\"Dubai\" href=\"https:\/\/web.archive.org\/web\/20201222015750\/https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/geos\/ae.html\" target=\"_blank\" rel=\"noopener noreferrer\">Dubai<\/a>) on attacking electronic door access control systems.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li>New Access Control Technology Holds the Key to Safer Schools: Unique RFID-based System Addresses the Shortcomings of Expensive and Inefficient Alternatives (prweb.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researcher Shawn Merdinger shows vulnerabilities in embedded door access control systems key data is found in easily accessible backup files<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,1400,67,944,4],"class_list":["post-2676","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-access-control","tag-hack","tag-iot","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=2676"}],"version-history":[{"count":20,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2676\/revisions"}],"predecessor-version":[{"id":132962,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2676\/revisions\/132962"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=2676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=2676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=2676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}