Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Cheap home alarms, door opening systems and wireless mains switches can be bypassed with low-cost and homemade devices that can replicate their infrared signals.
Using kit purchased online Canberra-based researcher Silvio Cesare found three ways to bypass a home alarm unit which could be extended to attack other fixed-code radio frequency systems.
"The list of hacking opportunities is pretty big," Cesare said in a blog detailing the research.
The first attack method used a re-purposed remote that replayed the codes within radio signals used to arm and disarm the home alarm system.
Another more simple method used a a $20 "infrared toy" purchased online that could analyse, capture and replay infrared signals to arm and deactivate alarm systems.
"It may take a few goes to capture it, but once captured you can replay it at will. How easy is that?" Cesare said.
But an even more basic method to disarm some alarm systems including the unnamed model tested was to simply purchase another alarm system of the same model and use the included remote. This worked because the vulnerable systems lacked an identifying transmission code.
In building the repurposed remote, Cesare cloned the infrared carrier wave to mimic his target alarm system. It required only an Arduino, breadboard and minor electronic components.
The second attack method built a remote using a frequency counter and oscilloscope.
'Learning' remotes which captured radio frequency signals did not work.
The rolling code systems used for keyless entry into some modern cars was not vulnerable to replay attacks.
Cesare said consumers should "remember to buy a decent home alarm system" and avoid cheap options.
He will present the research and further findings at the Melbourne Ruxcon conference in October.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.