Jump to content
Security Installer Community

Vulnerabilities In Ip Alarm Signalling Protocols


Recommended Posts

Posted

Not my work this time, but a guy from the Netherlands. He started reverse engineering the IP signalling protocol on an alarm so that he could act on events. Turns out the SIA-HS protocol is totally rotten

 

Here are the slides from his most recent talk, where he goes over some of the flaws in SIA-HS.

 

http://conference.hitb.org/hitbsecconf2013ams/materials/D1T2%20-%20Wilco%20Baan%20Hofman%20-%20Bringing%20Dutch%20Alarm%20Systems%20to%20Their%20Knees.pdf

 

 

I can't find a video of the presentation, but he did one last year on the same topic:

 

He also found problems in the Vebon SecIP protocol, although they are more subtle. Superficially it sounded good, but the details of the implementation led to it being quite insecure.

 

 

 

 

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Posted

don't you people have better things to do with your time??

That's what geeks do, geek things?

www.securitywarehouse.co.uk/catalog/

Posted

That's what geeks do, geek things?

 

i'd rather have a beer and get laid...

Posted

That's what geeks do, geek things?

i wont even ask what the dummy is for...tho real girlfriends are probably out of the question for those lads....

Posted

i wont even ask what the dummy is for...tho real girlfriends are probably out of the question for those lads....

I use wireshark all the time and I have a (human) wife?

i'd rather have a beer and get laid...

Hmm, I know I should too, but this stuffs more interesting.

www.securitywarehouse.co.uk/catalog/

Posted

Yet here we all are posting on tsi...

but i have a beer next to me now and at least 2-3 spare minutes later..

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.