IoT

Researcher Cracks San Francisco's Emergency Siren System

100%
0%

Bastille's director of vulnerability research, Balint Seeber discusses the process of creating SirenJack and cracking one of a city's critical safety systems. Filmed at Dark Reading News Desk at Black Hat USA 2018.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
donaldrobbinss
50%
50%
donaldrobbinss,
User Rank: Apprentice
11/3/2018 | 1:41:14 PM
Re: Good man, pointing out weak security.
like
A96.uk
100%
0%
A96.uk,
User Rank: Apprentice
8/28/2018 | 3:15:38 AM
Good man, pointing out weak security.
I also showed how to clone on TTN with LoRaWAN a year or two back.

LoRaWAN uses very poor secuirty using symmetric keys when asymmetric in hardware is required.

Massive IoT systems have been deployeed all over the world using this very poor security.

Cloning is easy and the current system does not know the difference.

TTN forum people could not understand what i was showing them, all fools.

 

I told the VP of Semtech about this and they sent me £2000 of kit to test.

LoRaWAN security design is broken, but they all dont want to talk about it.

 

I think the NSA told LoRaWAN design team , they must have access to all IoT devices & AES keys.

So now they have a database of AES keys!

I told them no one in security stores AES keys in a database.

 

I pointed to SAML11 for their education and the 508a/608a from Microchip.

 

Now most people using LoRaWAN think its safe as they are all sheep.

They all trust software security far to much, like idiot's they all are.

 

If only a BLACK HAT researcher would look into LoRaWAN security!

I have only 30 years experience under my belt, i used to work for bank security also.

 
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11358
PUBLISHED: 2019-04-20
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2019-11359
PUBLISHED: 2019-04-20
Cross-site scripting (XSS) vulnerability in display.php in I, Librarian 4.10 allows remote attackers to inject arbitrary web script or HTML via the project parameter.
CVE-2018-20817
PUBLISHED: 2019-04-19
SV_SteamAuthClient in various Activision Infinity Ward Call of Duty games before 2015-08-11 is missing a size check when reading authBlob data into a buffer, which allows one to execute code on the remote target machine when sending a steam authentication request. This affects Call of Duty: Modern W...
CVE-2019-11354
PUBLISHED: 2019-04-19
The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices ...
CVE-2019-11350
PUBLISHED: 2019-04-19
CloudBees Jenkins Operations Center 2.150.2.3, when an expired trial license exists, allows Cleartext Password Storage and Retrieval via the proxy configuration page.