BUSTER Posted November 23, 2015 Posted November 23, 2015 I am not in a position to verify if the above is right or wrong, I presume NSI will let us know in due course, does this apply to the latest units/firmware Quote Any comments / opinions posted are my opinion only and do not represent those of my employer or Company
james.wilson Posted November 23, 2015 Posted November 23, 2015 nsi dont get into product. so no nsi wont Quote securitywarehouse Security Supplies from Security Warehouse Trade Members please contact us for your TSI vetted trade discount.
Dick Posted November 23, 2015 Posted November 23, 2015 The problem in that respect is, where does the liability fall It has to be the manufacturer for allowing such inferior equipment to be released. Everyone else down the line has worked on trust. 1 1 Quote
al-yeti Posted November 23, 2015 Posted November 23, 2015 Can't you loop the device somehow and prove it can be defeated , or are they fixed to point to a certain ip, why can't you mimic the ip and then try and defeat it, or you need the device to complete its data connection Matrix stuff eh Quote
james.wilson Posted November 23, 2015 Posted November 23, 2015 It has to be the manufacturer for allowing such inferior equipment to be released. Everyone else down the line has worked on trust. technically its down to installer as thats the final cert issued Can't you loop the device somehow and prove it can be defeated , or are they fixed to point to a certain ip, why can't you mimic the ip and then try and defeat it, or you need the device to complete its data connection Matrix stuff eh if you 'test' systems like that then its a criminal offence, ie testing your system without permission. But would you like to know you have an issue or just assume you dont cos it hasnt happened to you yet? Quote securitywarehouse Security Supplies from Security Warehouse Trade Members please contact us for your TSI vetted trade discount.
cybergibbons Posted November 23, 2015 Author Posted November 23, 2015 Does anyone know if any Dualcoms have ever been compromised? Problem is, if they haven't moved on from the CS2300-R, there is no way to detect when a unit has been compromised. Quote I have a blog, some of which is about alarm security and reverse engineering:http://cybergibbons.com/
james.wilson Posted November 23, 2015 Posted November 23, 2015 till the alarm co gets sued for a fail to perform. Logs will show detection but with no confirm, or a faked open it wont be actioned im assuming they have moved on from the units you tested. Quote securitywarehouse Security Supplies from Security Warehouse Trade Members please contact us for your TSI vetted trade discount.
cybergibbons Posted November 23, 2015 Author Posted November 23, 2015 I am not in a position to verify if the above is right or wrong, I presume NSI will let us know in due course, does this apply to the latest units/firmware Why not start asking CSL questions then? For whatever unit you use... 1. What encryption methods do your devices use? 2. How often do the keys get changed? 3. If there was a critical vulnerability and the firmware had to be updated, who pays the cost? 4. Have your systems been subject to a third-party pen-test? Quote I have a blog, some of which is about alarm security and reverse engineering:http://cybergibbons.com/
al-yeti Posted November 23, 2015 Posted November 23, 2015 Sorry I don't get it , CG has a card second hand , he can do what he wants as long as he doesn't connect to csl servers ? Quote
cybergibbons Posted November 23, 2015 Author Posted November 23, 2015 Can't you loop the device somehow and prove it can be defeated , or are they fixed to point to a certain ip, why can't you mimic the ip and then try and defeat it, or you need the device to complete its data connection Matrix stuff eh I've done the following: * Built a simulator of the Dualcom DC4 IP server. This means I can make a board believe that it is communicating with the real server when it isn't really. * Built a GPRS modem simulator to show the same thing can happen on the GPRS side. Unfortunately, it seems that Dualcom (and others, like Saxondale and Cubit), seem to think that GPRS is secure. It isn't. im assuming they have moved on from the units you tested. Why don't people ask them if they have moved on? The hardware looks the same. The people are the same. CSL themselves have admitted that they can't update the firmware on any units at all. The formula has worked for them. Why spend money on security when no one is looking? Sorry I don't get it , CG has a card second hand , he can do what he wants as long as he doesn't connect to csl servers ? I can do what I want to the SPT, but to prove there are real issues, you need to show that you can either create fake alarms or spoof normal polling. Not possible without connecting to their servers. Quote I have a blog, some of which is about alarm security and reverse engineering:http://cybergibbons.com/
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.