TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Reverse Engineering a Smart Lock

BHIS · 2020-08-27 · Read original ↗

ATT&CK techniques detected

7 predictions
T1040Network Sniffing
98%
"_ java _ functions. js btsnoop ( android bluetooth hci logger ) ultimately, btsnoop has to be one of my greatest finds when wanting to capture a complete bluetooth session between central ( phone ) and peripheral ( lock ), i attempted various methods to capture my ota bluetooth s…"
T1573.001Symmetric Cryptography
88%
"##es, etc ). pay close attention to the 8th packet in this session. it shows the encrypted packet sent by the app containing the modified ekey value. from the frida hexdump, notice also that the 6 - byte ekey value is enumerated into bytes ( 5 : 11 ) of the modified ekey value. b…"
T1040Network Sniffing
62%
"in ccm aes - 128 ble security key exchange protocol handshakes. from what i could determine, this meant if the nrf52840 - dk was not sniffing at the time of the pairing, it would miss the security handshake entirely, resulting in no decryption of the packets. important : nrf snif…"
T1040Network Sniffing
62%
". log note : typically, i ’ ll leave the option enable bluetooth hci snoop log enabled, as it ’ s on my rooted test phone obtain btsnoop _ hci. log of complete bluetooth session listed android files pulled btsnoop _ hci log files renamed btsnoop _ hci. log to btsnoop _ hci - 07 -…"
T1190Exploit Public-Facing Application
42%
"5 : 11 ) of the decrypted modified ekey value. ( see below ) this little exercise clearly shows that if we can do an ota capture of the opening packet exchange of a legitimate owner in the wild, we would have everything we need ( including their user password – ekey ) to compromi…"
T1056.001Keylogging
41%
"5f bd a5 6a e5 ef 0e d0 5a 00 00 00 00 note : appnumber is encrypted with the commonkey and sent to the door ( lock ) as the very first packet transmission of the user session, thereby initiating commencement of the session. doornumber is a dynamic ( changes every new session ) 1…"
T1056.001Keylogging
40%
"again, f - secure provided a nice tool in their github that they called ‘ open _ from _ pcap ’. based upon information in their pre - recorded pcap session, this tool allowed them to replay the session and operate the lock. of course, this tool was rendered harmless when they red…"

Summary

Ray Felch // INTRODUCTION Recently I was afforded the opportunity to research the findings of a well-known security firm (F-Secure), who had discovered a vulnerability in the Guardtec KeyWe Smart […]

The post Reverse Engineering a Smart Lock appeared first on Black Hills Information Security, Inc..