Jump to content
Security Installer Community

Vulnerabilities In The Abus Secvest Wireless Alarm


Recommended Posts

Posted

Once again, not my work, but a look at the Abus Secvest alarm system, which is at least partially made by Cooper.

 

The wireless protocol isn't significantly different to a Yale or Friedland DIY alarm - no rolling code, no encryption, no authentication. Vulnerable to replay attacks.

 

http://sitsec.net/files/secvest_analysis.pdf

 

This is a grade 2 alarm, but is a million miles behind something like a Pyronix Enforcer or Texecom Ricochet in terms of security.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Posted

Yeah, the Abus kit is stupidly expensive - but I think if you are trade in the right country, it is probably a lot less? I know what I pay for alarms is a lot more than trade here.

 

What I found particularly interesting about this alarm is that it is very modern and forward thinking on the IP front, but it's like a system from 20 years ago on the RF front. It must be what the consumers want.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Posted

Rejigged Homelink 75? How similar are the devices to current cooper kit?

So, I've decided to take my work back underground.... to stop it falling into the wrong hands

 

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.