Тёмный

Intercom Hack Demo - DTMF tones injection 

Break To Protect
Подписаться 43
Просмотров 25 тыс.
50% 1

An demonstration of injecting DTMF tones via the intercom speakers to gain unauthorized physical access to the restricted floor by tricking the lift that an authorization 'buzz' (keypad tone "1" and long blast "#"). The company has since fixed this issue on their affected products.
For more details, please read the security advisory at: github.com/breaktoprotect/CVE...

Опубликовано:

 

19 дек 2019

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 27   
@3v068
@3v068 3 года назад
You know, If i still lived in apartments with elevators, I would totally try this if it had the security feature. I ought to see if any of my friends want to try this with the permission of the apartment of course. This looks like a lot of fun to do.
@breaktoprotect1735
@breaktoprotect1735 3 года назад
Hi all. This was meant to be just a storage/repository for proof of concept videos for security advisories and did not expect this many views. O.o wow. Nevertheless, thank you for the comments and likes. I'll try to respond whenever I can.
@RavingPegasus
@RavingPegasus 3 года назад
Same principal as phone phreaking.
@DoganT.
@DoganT. 4 года назад
I have no clue what you did, all I know is it worked and that’s awesome
@NortelGeek
@NortelGeek 3 года назад
Here's what's happening: (Long-ish read) In some buildings, you must select the party you're visiting on a directory system before the door or elevator will function. Once selected, the system calls the person in charge at the business or apartment and they're in charge of either telling you to go away (lol) or letting you in (some places call it "buzzing you in") by pressing a button or a combination of buttons on thier phone. The system "hears" the tones that the phone makes when those buttons are pressed (the same way the switch at the phone company hears them when you dial a number from your home phone and knows what numbers you pressed.) Since the audio is going in both directions like any other phone call, and since the system has no way of telling which side the tones are coming from, the person in the video is able to play a recording of those tones into the microphone, fooling the system into thinking that the owner pressed the proper buttons to allow the guest in. As a result, it granted them access. I'm sorry this was such a long explanation--I'm a telecom guy and I love phone stuff. I hope I was able to clear things up for you! -KC
@breaktoprotect1735
@breaktoprotect1735 3 года назад
@@NortelGeek Thanks for the explanation. That's pretty much it I guess.
@breaktoprotect1735
@breaktoprotect1735 3 года назад
@Aslan This is similar to IVR systems you hear from banks or government agencies automated telephone service. You call in, and the automated machine tells you to "Press 1 for English...press 2 for...". Those are DTMF tones. Pressing 1 and # (long press, not possible on most mobile phones) grants access to the attacker.
@NortelGeek
@NortelGeek 3 года назад
@@breaktoprotect1735 Sure thing! :) Glad to see videos like yours.
@mjt777x8
@mjt777x8 3 года назад
good idea
@goopypegasus-7740
@goopypegasus-7740 3 года назад
Why does it start beeping after you try to hack it
@breaktoprotect1735
@breaktoprotect1735 3 года назад
It uses standard telephone tones. I was trying to call my own unit, and I didn't pick it so it went straight to voice mail, and then proceed on to the 'dead' tone (probably not the right term). If you try calling someone on the landline, you should expect the same tones when the person hang up after talking to you or exit a voice mail message. Most people don't use landline these days, and from this question, you're likely born after 1995. =D Thanks for watching. Keep safe!
@STA-3
@STA-3 10 месяцев назад
kinda scary sounds but cool
@matty6598
@matty6598 Месяц назад
It sounded like a beat after a while
@tubbunny
@tubbunny 7 месяцев назад
That's a major blunder. Has it been fixed?
@BaconFaceMcGee
@BaconFaceMcGee 14 часов назад
This seems illegal.
@nuttapongpunpipat918
@nuttapongpunpipat918 3 года назад
So this could be prevented by only use elevator microphone for sending voice to target but not for parsing code. And the unit target should not expose the elevator microphone sound reached to the unit target microphone to prevent sound echoing to elevator system.
@nuttapongpunpipat918
@nuttapongpunpipat918 3 года назад
when above is applied, the only hacking way is to play that loud DTMF sound near unit target location.
@Gripengamer
@Gripengamer 3 года назад
Yeah just deactivate DTMF from the microphone source
@breaktoprotect1735
@breaktoprotect1735 3 года назад
@Picadilli Bingo. To be more specific, disable parsing of any tone from speakers as @nuttapong mentioned. I suspect there are more similar systems out there that uses DTMF tones for instructions.
@ZeranZeran
@ZeranZeran 3 года назад
HACK THE PLANET! that was awesome lol
@billneese5166
@billneese5166 4 месяца назад
Poor design letting the caller hear the DTMF being sent and/or the unlock tone; many work arounds are possible.
@wigwagstudios2474
@wigwagstudios2474 10 месяцев назад
soary
@vitkovskiy69
@vitkovskiy69 2 месяца назад
Щ
@tux8664
@tux8664 Год назад
reminds me of phone phreaking
@abecoulter8550
@abecoulter8550 3 года назад
fake
@BlackJacketWasp
@BlackJacketWasp 3 года назад
Well, according to the advisory, Fermax acknowledged it, fixed it and granted permission to the author to publish this. Why would a company admit the security issue if it was fake, let alone allowing publishing of potentially brand damaging content?
@breaktoprotect1735
@breaktoprotect1735 3 года назад
Are you familiar with US gov NIST? nvd.nist.gov/vuln/detail/CVE-2017-16778
Далее
Open, Sesame - entry phone hack
1:56
Просмотров 320 тыс.
Touch-Tone DTMF
5:04
Просмотров 36 тыс.
На фейсконтроле 💂
09:41
Просмотров 718 тыс.
Это реально работает?!
00:33
Просмотров 2,5 млн
Принцип работы DTMF.
4:42
Просмотров 7 тыс.
Dial Up Modem Sounds, 56K Edition
5:48
Просмотров 41 тыс.
1954 How to dial your phone by Bell System
9:51
Просмотров 631 тыс.
Whelen 295sl100 Siren Demo Part1
2:02
Просмотров 196 тыс.
How To Analyze DTMF in SIP Calls by Wireshark
5:48
Просмотров 12 тыс.
Baofeng DTMF remote control
4:02
Просмотров 12 тыс.