• Guest
HabraHabr
  • Main
  • Users

  • Development
    • Programming
    • Information Security
    • Website development
    • JavaScript
    • Game development
    • Open source
    • Developed for Android
    • Machine learning
    • Abnormal programming
    • Java
    • Python
    • Development of mobile applications
    • Analysis and design of systems
    • .NET
    • Mathematics
    • Algorithms
    • C#
    • System Programming
    • C++
    • C
    • Go
    • PHP
    • Reverse engineering
    • Assembler
    • Development under Linux
    • Big Data
    • Rust
    • Cryptography
    • Entertaining problems
    • Testing of IT systems
    • Testing Web Services
    • HTML
    • Programming microcontrollers
    • API
    • High performance
    • Developed for iOS
    • CSS
    • Industrial Programming
    • Development under Windows
    • Image processing
    • Compilers
    • FPGA
    • Professional literature
    • OpenStreetMap
    • Google Chrome
    • Data Mining
    • PostgreSQL
    • Development of robotics
    • Visualization of data
    • Angular
    • ReactJS
    • Search technologies
    • Debugging
    • Test mobile applications
    • Browsers
    • Designing and refactoring
    • IT Standards
    • Solidity
    • Node.JS
    • Git
    • LaTeX
    • SQL
    • Haskell
    • Unreal Engine
    • Unity3D
    • Development for the Internet of things
    • Functional Programming
    • Amazon Web Services
    • Google Cloud Platform
    • Development under AR and VR
    • Assembly systems
    • Version control systems
    • Kotlin
    • R
    • CAD/CAM
    • Customer Optimization
    • Development of communication systems
    • Microsoft Azure
    • Perfect code
    • Atlassian
    • Visual Studio
    • NoSQL
    • Yii
    • Mono и Moonlight
    • Parallel Programming
    • Asterisk
    • Yandex API
    • WordPress
    • Sports programming
    • Lua
    • Microsoft SQL Server
    • Payment systems
    • TypeScript
    • Scala
    • Google API
    • Development of data transmission systems
    • XML
    • Regular expressions
    • Development under Tizen
    • Swift
    • MySQL
    • Geoinformation services
    • Global Positioning Systems
    • Qt
    • Dart
    • Django
    • Development for Office 365
    • Erlang/OTP
    • GPGPU
    • Eclipse
    • Maps API
    • Testing games
    • Browser Extensions
    • 1C-Bitrix
    • Development under e-commerce
    • Xamarin
    • Xcode
    • Development under Windows Phone
    • Semantics
    • CMS
    • VueJS
    • GitHub
    • Open data
    • Sphinx
    • Ruby on Rails
    • Ruby
    • Symfony
    • Drupal
    • Messaging Systems
    • CTF
    • SaaS / S+S
    • SharePoint
    • jQuery
    • Puppet
    • Firefox
    • Elm
    • MODX
    • Billing systems
    • Graphical shells
    • Kodobred
    • MongoDB
    • SCADA
    • Hadoop
    • Gradle
    • Clojure
    • F#
    • CoffeeScript
    • Matlab
    • Phalcon
    • Development under Sailfish OS
    • Magento
    • Elixir/Phoenix
    • Microsoft Edge
    • Layout of letters
    • Development for OS X
    • Forth
    • Smalltalk
    • Julia
    • Laravel
    • WebGL
    • Meteor.JS
    • Firebird/Interbase
    • SQLite
    • D
    • Mesh-networks
    • I2P
    • Derby.js
    • Emacs
    • Development under Bada
    • Mercurial
    • UML Design
    • Objective C
    • Fortran
    • Cocoa
    • Cobol
    • Apache Flex
    • Action Script
    • Joomla
    • IIS
    • Twitter API
    • Vkontakte API
    • Facebook API
    • Microsoft Access
    • PDF
    • Prolog
    • GTK+
    • LabVIEW
    • Brainfuck
    • Cubrid
    • Canvas
    • Doctrine ORM
    • Google App Engine
    • Twisted
    • XSLT
    • TDD
    • Small Basic
    • Kohana
    • Development for Java ME
    • LiveStreet
    • MooTools
    • Adobe Flash
    • GreaseMonkey
    • INFOLUST
    • Groovy & Grails
    • Lisp
    • Delphi
    • Zend Framework
    • ExtJS / Sencha Library
    • Internet Explorer
    • CodeIgniter
    • Silverlight
    • Google Web Toolkit
    • CakePHP
    • Safari
    • Opera
    • Microformats
    • Ajax
    • VIM
  • Administration
    • System administration
    • IT Infrastructure
    • *nix
    • Network technologies
    • DevOps
    • Server Administration
    • Cloud computing
    • Configuring Linux
    • Wireless technologies
    • Virtualization
    • Hosting
    • Data storage
    • Decentralized networks
    • Database Administration
    • Data Warehousing
    • Communication standards
    • PowerShell
    • Backup
    • Cisco
    • Nginx
    • Antivirus protection
    • DNS
    • Server Optimization
    • Data recovery
    • Apache
    • Spam and antispam
    • Data Compression
    • SAN
    • IPv6
    • Fidonet
    • IPTV
    • Shells
    • Administering domain names
  • Design
    • Interfaces
    • Web design
    • Working with sound
    • Usability
    • Graphic design
    • Design Games
    • Mobile App Design
    • Working with 3D-graphics
    • Typography
    • Working with video
    • Work with vector graphics
    • Accessibility
    • Prototyping
    • CGI (graphics)
    • Computer Animation
    • Working with icons
  • Control
    • Careers in the IT industry
    • Project management
    • Development Management
    • Personnel Management
    • Product Management
    • Start-up development
    • Managing the community
    • Service Desk
    • GTD
    • IT Terminology
    • Agile
    • Business Models
    • Legislation and IT-business
    • Sales management
    • CRM-systems
    • Product localization
    • ECM / EDS
    • Freelance
    • Venture investments
    • ERP-systems
    • Help Desk Software
    • Media management
    • Patenting
    • E-commerce management
    • Creative Commons
  • Marketing
    • Conferences
    • Promotion of games
    • Internet Marketing
    • Search Engine Optimization
    • Web Analytics
    • Monetize Web services
    • Content marketing
    • Monetization of IT systems
    • Monetize mobile apps
    • Mobile App Analytics
    • Growth Hacking
    • Branding
    • Monetize Games
    • Display ads
    • Contextual advertising
    • Increase Conversion Rate
  • Sundry
    • Reading room
    • Educational process in IT
    • Research and forecasts in IT
    • Finance in IT
    • Hakatonas
    • IT emigration
    • Education abroad
    • Lumber room
    • I'm on my way

Security agency and "new" technology

 
3r3-31.
The story of how not to do authorization, especially in areas important for life and property, such as, for example, managing an alarm through the application from the phone.
3r3118.  
Security agency and "new" technology
3r3118.  
A small preface. 3r3334. 3r3118.  
It all started with the fact that I built a house, and a house without a security alarm can exist in our realities, of course, but nothing can be left there in the slightest degree (the sad cases of the neighbors confirm this). While the decoration was being made inside and outside, the keying and disarming of the key did not cause any inconvenience.
3r3118.  
The house has a garage, the gate opens with a remote control and, accordingly, a car is placed there. If the house is guarded, the opening from the remote control will trigger a “alarm” at the gate and after 2-3 minutes the arrival of serious guys. To avoid this, you must first remove the guard (open the vestibule, attach the key, close the vestibule, get into the car again) and then open the gate. And somehow this procedure is a bit annoying, especially in winter, and indeed all the "magic" is somehow lost.
3r3118.  
Of course, you can slyly do it so that opening the gate removes the alarm, but I haven’t gotten to that yet.
3r3118.  
But I heard that our security agency has a miracle application "Mobile Phoenix Keyboard". The application is not exactly theirs, but they work with it. With it, you can control the alarm from your phone, which more or less returns the joy of using all of this.
3r3118.  
3r3333. And now the story itself. 3r3334. 3r3118.  
To connect the security management from the application, you need to come to the office of the security agency, find the necessary engineer, pay 400 rubles for the “tune-up” to the cashier, and you will be given an account that is driven into the settings on the phone and voa-la, you can steer the guards as you like, receive push notifications and not know grief.
3r3118.  
Everything would be fine, but when you register, you are given a login in the form of three letters, for example abb (initials), and the password is made from the last four digits of the phone number (as the engineer said - not to be forgotten), that is, for example 0808. A little taken aback by what he heard, asked if it was possible to set another password, they said that it was possible, but only numbers. Well, ok, I asked myself the right password and retired to test how everything works.
3r3118.  
3r3118.  
In my head, meanwhile, an idea had already matured - but would you try
3r3118.  
We take the iPhone, connect it to the Mac, run: rvictl -s iPhone_UDID , we cling to the new interface through Wireshark and see how it works and what it sends our application. You can take other devices /tools, but I have such.
3r3118.  
3r361.
3r3118.  
It works, it turns out, through the wamp protocol - this is essentially almost the same web socket. Naturally, nothing is encrypted and you can see exactly how requests are sent and actually repeat them.
3r3118.  
Now we try to reproduce the received requests. All this for the speed of tests, you can put an extension for chrome like "Web Socket Client" and try there.
3r3118.  
3r3118.  
After making sure that everything works exactly as expected, we quickly write the client, for example, to node.
3r3118.  
We notice that the API responds to us with different messages when the user is not found at all and when the password is incorrect. This will speed up the process.
3r3118.  
Our client will be pretty dumb, but effective nonetheless. The client enumerates all logins consisting of 3 letters. If the login exists, it starts brute force password search; if not, proceed to the next one. The password is moved in the range from 0000 to 9999.
3r3118.  
We start all this and wait. The logins moved quickly enough (10 minutes), it turned out about 150 pieces (the service is not so much used). The password for each login is approximately 8 minutes. There are no restrictions on checking in the API. And you can hammer multithreaded.
3r3118.  
Passwords were selected in 100% of cases. If the password is successfully selected, the API spits out such information as: the owner’s full name, addresses (there may be a lot of objects), some tokens (apparently for sending them to push), session id, and so on.
3r3118.  
Having authorized, it is possible to disarm the whole object accordingly. Objects themselves came across rather distant from the city. If this information fell into the hands of the “bad guys,” the autopsy, as it were, of a protected object, would have passed without any problems, and then calmly could have been armed, and no one would have noticed anything.
3r3118.  
Realizing that I myself am a client of this office - it became a bit uncomfortable.
3r3118.  
One thing pleases, apparently some kind of monitoring the company has or may have accidentally noticed, but after a while the application stopped accepting passwords and suggested contacting the office.
3r3118.  
As a result, all logins changed and made normal passwords. The protocol, however, was as unencrypted, and remained, but at least something.
3r3118.  
What is this all about? Maybe after that someone will want to make their system a bit safer, and someone who uses the same service with similar passwords will look at it from the other side and ask for action. Such simple actions will slightly increase the level of security. 3r3118.  
I deliberately do not give names here and as much as possible depersonalized all the data, so that whoever recognizes himself would come to conclusions :)
3r3118.  
P.S. This article is for informational purposes only, the problems described here are no longer relevant at the time of publication - the company took action.

It may be interesting

  • Comments
  • About article
  • Similar news
This publication has no comments.

weber

Author

15-11-2018, 20:29

Publication Date

Development / Programming

Category
  • Comments: 0
  • Views: 245
Saving data from a Linux partition
Evaluation of new projects
AlphaZero again beat Stockfish in a
UBS analysts: by 203? Alphabet’s
Algorithm: How to find the next
Analysis of the quality of educational
Write a comment
Name:*
E-Mail:


Comments
Visit Our website If You Need Custom thanksgiving couple shirts, Shirts For Your Company, Family Or Friends & We’ll Cook Something Special for you!
Yesterday, 21:10

raymond weber

Inursing test bank was very pleased  to find this site.I wanted to thank you for this great read!! I definitely  enjoying every little bit of it and I have you bookmarked to check out new  stuff you post.  
Yesterday, 18:20

taxiseo2

You completed certain  reliable points there. I did a search on the subject and found nearly all  persons will agree with your blog.  
nursing test bank
Yesterday, 18:04

taxiseo2

Great post i must say  and thanks for the information. Education is definitely a sticky subject.  However, is still among the leading topics of our time. I appreciate your  post and look forward to more.
nursing test bank
Yesterday, 17:29

taxiseo2

So good! This web post provides knowledge, knowledge, good news, and is very useful. Thank you for everything Taxi Driver Jacket
Yesterday, 15:35

MalenaMorgan

Adv
Website for web developers. New scripts, best ideas, programming tips. How to write a script for you here, we have a lot of information about various programming languages. You are a webmaster or a beginner programmer, it does not matter, useful articles will help to make your favorite business faster.

Login

Registration Forgot password