Lock Picking in the Era of Internet of Things Edward Knight, Sam Lord, and Budi Arief

Total Page:16

File Type:pdf, Size:1020Kb

Lock Picking in the Era of Internet of Things Edward Knight, Sam Lord, and Budi Arief Lock Picking in the Era of Internet of Things Edward Knight, Sam Lord, and Budi Arief School of Computing, University of Kent, United Kingdom [email protected], [email protected], [email protected] Abstract—Smart locks are a recent development in the mechanism to allow their user to unlock it should the Internet of Things that aim to modernise traditional key- associated smartphone become unavailable (e.g. due to the based padlock systems. They allow users to operate the smartphone being lost or stolen, or if the smartphone’s lock with their smartphone instead of carrying around a physical key. Typically, smart locks have a cloud system for battery has run out). In a sense, these override mechanisms sharing access with other people, which makes them ideal provide a way to open the lock with “something the user for schemes such as communal lockers or bike sharing. One knows”, akin to a combination lock or a password. of the smart locks available on the market is that produced by Master Lock. They are an established brand, and unlike Locks have traditionally been judged on their physical many of the single product companies that have provided security; how well they stand up to picking, shimming and insecure offerings, Master Lock have so far shown that cutting into. Smart locks need to be physically secure as their locks are reasonably secure and resistant to known attacks such as shimming, fuzzing, and replay attacks. This well as have a secure connection to a secure management paper provides a security analysis of the Master Lock system. The market of smart locks is mostly made up of Bluetooth padlock. More importantly, it reveals that there small startup companies manufacturing a single product, were several security vulnerabilities, including a serious one and many of them have been proven to be insecure (for ex- in the Application Programming Interface used by Master ample [6] and [7]). The work presented in this paper looks Lock to provide a crucial feature for managing access. We carried out a responsible disclosure exercise to Master Lock, at the security of a smart lock built by an established lock but communication proved to be quite a challenge. In the end manufacturer (Master Lock, https://www.masterlock.com/) we managed to establish contact, and as a result the most to see if they have better security than other (relatively serious vulnerabilities have now been patched. This indicates new) companies. that responsible disclosure is a valuable exercise, but we still need better report-and-response mechanisms. The key contributions of this paper are: (i) a thorough Keywords: security, IoT, smart locks, API vulnerabilities, and systematic security analysis of the Master Lock Blue- responsible disclosure. tooth padlock, leading to (ii) the revelation of several vulnerabilities, including a serious security issue with the I.I NTRODUCTION Application Programming Interface (API) used, and (iii) Internet of Things (IoT) devices are gaining popularity an impactful responsible disclosure exercise, which ended and becoming more ubiquitous in our lives. There has up with the manufacturer of Master Lock patching their been a significant growth of IoT devices over the past system to address the vulnerabilities we uncovered. few years [1], but this new market has gained a reputation Section II provides an overview of related work in investi- for churning out insecure systems. This has led to security gating security issues in smart locks. Section III introduces and privacy concerns (such as [2]–[4]) and even a large- the Master Lock Bluetooth padlock, including its system scale Distributed Denial of Service attack using the Mirai and communication architecture. Section IV outlines our botnet of compromised IoT devices [5]. methodology for finding potential security vulnerabilities Smart locks provide a modern alternative to the traditional in Master Lock, along with an attacker model. Section V key or combination lock, and access is generally managed presents and discusses the results of our investigation, as by an online service. Typically the locks themselves do well as our responsible disclosure. Section VI concludes not connect to the internet directly, but communicate our paper and provides some ideas for future work. with a smartphone app, which in turn talks to the online service. This separation allows for locks to work offline, II.R ELATED WORK an important feature if the owner is without an internet Limited prior research has been undertaken regarding the connection or the online service becomes unavailable, security of smart locks. Nevertheless, there is a wide range but also increases the attack space. The smartphone can of potential attack vectors. These include physical attack, be thought of as the “key”, allowing its user to lock, wireless communication sniffing and spoofing, as well as unlock and even share the smart lock with other users. exploiting the supporting back end services that enable Furthermore, these locks typically provide an override many of the “smart” features of smart locks. There is a wealth of related work in IoT security, some of which has informed our research here. An early paper by Suo et al. [8] provides an overview of four key layers of typical IoT architecture (perceptual, network, support and application layers). Of particular interest to us is the support layer, in which centralised control func- tionality (such as access management) is implemented. Figure 1. Master Lock and its override buttons The challenge here is how to detect malicious activity, such as commands that should not be executed due to insufficient privileges, but may be performed anyway due Bluetooth LE REST API to improperly implemented access control. Figure 2. Master Lock components and their communication Wurm et al. [9] performed security analyses on consumer and industrial IoT devices. Some of the techniques used • Man-in-the-Middle: by hosting a service which sits (hardware and network communication analysis, reverse between the phone and the real cloud service, it is engineering) gave us some initial direction when looking possible to modify requests and responses at Master Lock’s offering. • Reading the firmware: downloading the firmware for We found that most of the investigation into breaking the device from the cloud service and looking for any smart lock security has come from hacking communities, hard-coded secrets with scarce academic papers looking into the potential Additionally, after mapping out the API, the author made security vulnerabilities of smart locks. One example of a Software Development Kit (SDK) for accessing the the latter is a paper on the Noke¯ smart lock [10]. The API. This SDK made it easier for them to investigate the researchers focused on the manual override feature of the methods provided by the API and to search for potential Noke¯ lock and studied human-generated unlock codes. vulnerabilities. They showed that the human-generated codes were of low enough entropy to pose a serious vulnerability. A Master Lock have registered patents for the lock itself [11], mechanical brute-force tool was built to demonstrate this. managing the authentication keys over wireless communi- cation [12] and for wireless firmware updates [13]. This A DEF CON presentation on hacking Bluetooth locks [6] indicated to us that Master Lock has put some effort into specifically stated that two locks (from Noke¯ and Master designing these systems, and also gave us a starting point Lock) had not been cracked, showing that neither padlock for areas to investigate. had trivially broken security. This provided a challenge and a list of common attacks on smart locks to focus on: III.S YSTEM OF INTEREST:MASTER LOCK • Plain-text passwords: Bluetooth transmission of pass- We chose to focus on Master Lock as it is an established words without encryption brand specialising in various lock and padlock systems. • Replay attacks: where a recording of the communi- We had hoped that this industry experience would result cation can be replayed to unlock the device in a more secure system than their competitors. • Fuzzing: sending invalid data can cause the device to enter an error state and open A. System architecture • Device spoofing: using a computer to pretend to be The Master Lock Bluetooth padlock is a Bluetooth enabled the lock, we can listen to commands sent by a phone padlock which comes in two form factors for indoor and and use them to unlock the real device outdoor usage. It has the look and feel of an ordinary • Hard-coded secrets: some lock manufacturers include padlock but instead of a keyway, it has a 4-directional pad hard-coded secrets in the smartphone application, that serves as the input device for the override mechanism which can be retrieved by decompiling it (see Figure 1). Another presentation from DEF CON included the full The overall Master Lock system has three key components methodology used to hack an August Smart Lock installed (Figure 2): the padlock, the smartphone application, and in a front door [7]. This was of particular interest since the the cloud service. These components communicate to each methods used attacked both the Bluetooth communication other by using two protocols: Bluetooth Low Energy layer and the supporting cloud service, which is similar in (BLE) and HTTP, using the smartphone application as the architecture to the Master Lock service. They looked at: interlinking component. • Investigating the cloud service API: checking if users The padlock has the Slave Role, and communicates with can get privileged data or perform privileged actions the smartphone, which gets the Master Role [14, Vol 6, from a guest account Part B, Section 1.1, p. 2553]. This means that the padlock advertises itself when it turns on, on one of the three To share the device with other users, one can either share a advertising channels.
Recommended publications
  • Lock Picking Guide 2001
    SECRETS OF LOCK PICKING By Steven Hampton Originally Published by Paladin Press (c) 1987 (don't let the date fool you. This is good stuff)- Dr Bloodmoney (brought to you by Dr. Bloodmoney) [Converted to pdf / edited / updated by: ALEx604 Oct., 31st 2001 Shouts to Midirain, Draven, Wolfe347, Netdenizen, The Redwood Mafia] ( "Well, I'm bringing you this file because I have a scanner and an OCR package and I like to pick locks. This file is a complete transcription of the book, Secrets of Lock Picking by Steven Hampton, minus the chapter on warded locks (These locks are cheap. Use a hammer and a screwdriver). Before getting on to the subject, I would just like to use this opportunity to say that you can not just read this file and know how to pick locks. It does take practice. The good news is that by practicing you will learn how to open locks. And fast, too. I have heard many people say "It's not like the movies... it takes time to pick a lock." Well, sometimes that's true, but I have picked a Sargeant six-pin, high-security tumbler lock in three seconds. And other similar locks in the the same time frame as well. So I know that it can be done. But don't worry. Practicing is not boring. There is a certain thrill present when you pick a lock for the very first time. Imagine the sensation of knowing that you can get into almost anywhere you want. Believe me when I tell you that it is very cool."- Dr.
    [Show full text]
  • Complete Guide to Lock Picking Pdf, Epub, Ebook
    COMPLETE GUIDE TO LOCK PICKING PDF, EPUB, EBOOK Eddie the Wire | 78 pages | 01 Jun 1998 | Loom Panics Unlimited | 9780915179060 | English | Port Townsend, United States Complete Guide to Lock Picking PDF Book We like to say that lock picking is practical brain training. It has a little bit of everything and comes at a great price. It is a great choice for Airbnbs or other rentals; you can send guests a code that expires after their stay. We also offer faster, tracked shipping that arrives between 2 - 5 days - just upgrade at the checkout! Eventually, some locks will open in a few seconds. Master Lock padlocks include a shackle, indicator and dial. To remove the old lockset, look for either a screw on the cover plate or a slot on the side of the handle on the interior door lock. You taught me lockpicking with it! This simple puzzle design is very effective. And once you're finished with the practice locks - you'll be hungry for more lock challenges. If your lock has a serial number, you may be in luck. Sparrows as another brand shoppers search for. By the way, would a tempered piece of wire say, from a paper clip? Beautifully designed picks that have stood the test of time and that are manufactured locally in the US. Just upgrade your set. Great deal - Keep it up guys Just a moment while we sign you in to your Goodreads account. Lock Picking Books and How-to guides. Me and my friends have a blast picking at the included practice locks.
    [Show full text]
  • The Spectacle of Security: Lock-Picking Competitions and the Security Industry in Mid-Victorian Britain
    This is a repository copy of The spectacle of security: lock-picking competitions and the security industry in mid-Victorian Britain. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/83078/ Version: Accepted Version Article: Churchill, D (2015) The spectacle of security: lock-picking competitions and the security industry in mid-Victorian Britain. History Workshop Journal, 80 (1). 52 - 74. ISSN 1363-3554 https://doi.org/10.1093/hwj/dbv018 Reuse Unless indicated otherwise, fulltext items are protected by copyright with all rights reserved. The copyright exception in section 29 of the Copyright, Designs and Patents Act 1988 allows the making of a single copy solely for the purpose of non-commercial research or private study within the limits of fair dealing. The publisher or other rights-holder may allow further reproduction and re-use of this version - refer to the White Rose Research Online record for this item. Where records identify the publisher as the copyright holder, users can verify any specific terms of use on the publisher’s website. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Spectacles of Security: Lock-Picking Competitions and the Emergence of the British Security Industry in the Mid-Nineteenth Century David Churchill [This article is forthcoming in the History Workshop Journal.] Despite decades of research on the history of crime, policing and punishment, historical work on security remains in its infancy.
    [Show full text]
  • A Summary of Lockpicking
    Tristan Guédel - Alexandre Triffault Translated to English by MrAnybody A Summary of Lockpicking A better understanding of the practice of non-destructive entry ZZZRXYHUWXUHÀQHFRP Table of contents Warning...........................................................................................................3 Operation of a standard lock ......................................................................4 The components of a lock cylinder ...........................................................5 The principles of lock-picking ....................................................................9 The anti-picking pins ....................................................................................14 The different tools .......................................................................................18 Buying tools ...................................................................................................26 Picks for pin tumbler locks ..........................................................................29 Making your own tools ................................................................................35 Picking techniques ........................................................................................38 Conclusion .....................................................................................................48 The Code of Intellectual Property prohibits copies or reproductions intended for collective use. In this context, any representation or reproduction in whole or in part by any means
    [Show full text]
  • About Locks and Ways to Low Tech Hack Them 3
    CHAPTER More about locks and ways to low tech hack them 3 INFORMATION IN THIS CHAPTER • A Little More about Locks and Lock Picking • Forced Entry—And Other Ways to Cheat! • Let’s Break into a Semi–High Security Room • Keys and Key Control • Bait and Switch War Story That Could Happen to You • Some Places to Go to Learn and Have Some Fun • More about Keys and How to Make One If You Don’t Have One • Ways to Make a Key If You Didn’t Bring a Key Machine • One Final Lock to Talk about and Then We’re Done As I was preparing to write this chapter, I found myself thinking back over the past 45 years of my life. I consider myself one of the most blessed people on the planet when I think about all the things that I’ve been able to do and learn. I be- came somewhat of a techno geek while attending vocational-technical high school back in the mid-sixties. I’ve found electronics to be absolutely fascinating. In my senior year I was able to design a variable-speed (computerized) control for a synchronous motor using a handful of transistors. It was considered by the school to be their first computerized control of an AC synchronous motor. When I visited the school about 10 years later, I was pleasantly surprised to see that they were still using the training manual that I had written describing how to construct this comput- erized control. It had taken me weeks to figure out how to do this.
    [Show full text]
  • LSS+ MASTER EXHIBIT LISTING Page 1
    LSS+ MASTER EXHIBIT LISTING LOCKS, SAFES, AND SECURITY LSS+ Version 5.0 Electronic Infobase Version 5.0, based upon the Second Edition, published by Charles C. Thomas, Springfield Illinois, 2000. The original edition was published in 1970 and is no longer available. Table of Contents Chapter 1 The Lock: Four Thousand Years of Technology Chapter 2 The Last Twenty-Five Years Chapter 3 Definition of Terms Chapter 4 Tools and Supplies Chapter 5 Materials and Processes Chapter 6 The Development of Keys Chapter 7 Processes and Materials for Producing Blank Keys Chapter 8 Methods of Producing Cut Keys Chapter 9 Producing Keys for Specific Locks Chapter 10 High-Security Locks and Keys Chapter 11 Keying Systems Chapter 12 Basic Lock Configurations: Hardware Chapter 13 Warded Locks Chapter 14 The Lever Tumbler Lock Chapter 15 Wafer Locks Chapter 16 Pin Tumbler Locks Chapter 17 Traditional Mechanical Locking Systems Chapter 18 Electromechanical Locks Chapter 19 Magnetic Locks Chapter 20 Wireless Exchange of Code Information Chapter 21 Intelligent Keys and Locks Chapter 22 Programmable Locks and Keys Chapter 23 Specialized Industry Applications Chapter 24 Investigation and Evidence Involving Locks and Keys Chapter 25 Forensic Examination: Specifications, Operations, and Security Chapter 26 Forensic Examination: Tool Marks and Trace Evidence Chapter 27 Forensic Examination of Keys Chapter 28 General Introduction to Bypass Chapter 29 Picking Chapter 30 Impressioning Chapter 31 The Decoding of Locks: Theory, Procedures, and Technologies Chapter 32 Destructive
    [Show full text]
  • Product Guide
    ® !UTOMOTIVEs#OMMERCIALs&ACILITYs2ESIDENTIALs2ETAIL3OLUTIONS PRODUCT GUIDE Our Family of Brands: By PRO-LOK ® ® KEY CHAINS MAY 2017 Catalog # 18720317 Our Family of Brands: ® ® is built on decades of experience in the manufacturing, security, and retail industries. ® merges innovative thinking, superior engineering, and distinct industry knowledge to develop high quality products that create valuable solutions that solve problems, save time, and make our customers money. ® is known for its continued committment to excellence in cutomer service and product quality. As a family owned and family operated manufacturing company based in Orange, CA, ® has been manufacting USA MADE products since 1983. Based on the knowledge we have collected, and 17 patents awarded, we have been able to supply the right solutions for the right situation. ® 655 North Hariton Street Orange, California 92868 United States of America Phone: 866.679.1366 Fax: 714.633.0470 Email: HelpDesk@ ®.com ® © 2017 All Rights Reserved. is not responsible for typographical errors found in this literature. ® TOOL DIVISION 04 Door Hardware Installation 06 Installation Templates 10 Installation Jigs 06 Installation Accessories 14 Security Door Hardware 15 Entry Armor 15 Blue Punch Key Machines 04 Blue Punch Key Machines 05 Blue Punch Accessories 05 Lock Servicing 49 Key Decoders 51 Key Hooks 51 Key Tags 51 Lock Picking 45 Safe “Butter” Bits 50 Automotive Servicing 42 Shop Tools 52 Automotive 35 Automotive Opening Kits 36 Automotive Opening Tools 40 Automotive Opening Lights 41
    [Show full text]
  • A Locksport Primer
    A locksport primer locksport international brings you A Brief introduction to lock picking learn to pick locks with a visual step-by-step guide learn how to re-pin to learn more visit a lock, make tools, www.locksport.com and more! copyright notice: This document may be freely distributed in its original format. this document may not, at any time, be offered for sale. Written and compiled by Paul wragg and Josh nekrep for locksport international table of contents: 1. Introducing LI ........................1 . 2. How Locks work......................2 3. re-pinning a lock....................4 4. the pencil trick.......................8 5. mechanical defects.................9 6. applying tension...................10 7. the binding effect..................11 7. possible pin states................12 8. a brief intro to tool making..13 9. where to get more info ........17 10. why get invloved with LI .....18 11. LI Membership Application ..19 www.locksport.com INtroducing Locksport International From all of us at Locksport International, I'd like to thank you for picking up this guide. We hope you will find it helpful as you take on the new challenge of learning to pick locks. But first, allow me to tell you a little about LI. In early spring of 2005 Josh Nekrep (digital_blue on lockpicking101.com) approached Kim Bohnet (Varjeal, site administrator on lockpicking101.com) with the idea of starting a club with the purpose of bringing lockpicking enthusiasts together and promoting the sport/hobby with face-to-face interaction. At the time there were a couple large regional clubs (SSDeV in Germany and TOOOL in The Netherlands) but there was no broad-based club.
    [Show full text]
  • Master Lock Commercial Security Products Technical Manual
    Commercial Security Products TECHNICAL MANUAL ISSUE 06.13 Electronic Update September 2013 Table of Contents Index by Model No. 1 ProSeries ® 6270 & 6271 Lock Service Procedure 2 ProSeries ® Rekeyables Service Procedure 3 ProSeries ® 6230 Locks Service Procedure 5 ProSeries ® Rekeyables Component Parts 4,6 ProSeries ® Interchangeable Core Service Procedure 7 ProSeries ® Interchangeable Core Component Parts 8 ProSeries ® Door Hardware Service Procedure 9 ProSeries ® Door Hardware Component Parts 10 21, 24, 25, 27 and 101 Laminated Rekeyables Service Procedure 11 Python ™ Cylinder Compatible Products Service Procedure 11 Cylinders and Retainers 13-17 Cylinder Service Procedure 18 Keying 19-22 Improved 6000 and 7000 Keyways 23 Keys and Keyways 24 Bitting Specifications 25 ProSeries ® Actuators, Retainers and Drivers 26-27 Tools 28 Lock Lubricants 29 Terminology 30-38 Model Number Index Service Procedures and Parts Service Service Service Service Product No. Procedure Parts Product No. Procedure Parts Product No. Procedure Parts Product No. Procedure Parts 6121 346427 786836 787036 78 6125 346521 786840 347040 36 6127 346527 786841 787041 78 6230 566621 9 10 6842 9 10 7042 9 10 6270 226627 9 10 6850 367045 36 6271 226721 9 10 6851 787046 78 6321 346727 9 10 6852 9 10 7047 9 10 6325 346830 347030 367050 36 6327 346831 787031 787051 78 6421 786835 367035 367052 9 10 1 Master Lock introduced the ProSeries ® product line in 1992 with Weather Tough ® and High Security, iron shrouded, rekeyable padlocks. Intent on providing locksmiths with greater ease and flexibility, Master Lock designed the padlocks to use standard components across the line. Since then, ProSeries ® has grown to include solid body padlocks in Brass, Steel and Aluminum to further satisfy corrosion, security and safety requirements.
    [Show full text]
  • 2012 Catalog
    Lock Picks, Lock Picking & Lockout Tools, Locksmith Training Serving Law Enforcement, Military, Locksmith and Recovery Specialists worldwide! 2012 Catalog Order by phone: 1-877-919-LOCK (US and Canadian customers) Fax your order: 1-978-349-6060 Locksmith Parts & Supplies c/o ALI 1 Chestnut Street Nashua, NH 03060 USA Table of Contents Automotive Lockout Kits, Auto Entry Tools, Tryout Keys, Jigglers.........................................................................3 Automotive Pick Sets, Tools........................................................................................................................................17 Premium European Slim line Picks- Reinforced Metal Handles............................................................................19 Lock Picks - European Slim Line..............................................................................................................................25 Standard Lock Picks - Dependable & Economical..................................................................................................29 Lock Pick Tension Tools - Turning Tools...................................................................................................................33 Premium Lock Picks - Reinforced Stainless Handles - Tough & Economical.......................................................43 Locksmith Training Tools, Cut Away Locks - Innovative & Affordable................................................................46 Locksmith Training Courses and Certi®cation........................................................................................................48
    [Show full text]
  • LOCKSMITH TOOLS SECTION 11 Section Table of Contents Hurricane Door Kits
    ORDER ONLINE www.SouthernLock.com LOCKSMITH TOOLS SECTION 11 Section Table of Contents Hurricane Door Kits ........................... 538 Shims ......................................... 495, 530 I Slim Jims ........................... 495, 498, 515 Snap-In Bridges ................................. 496 A Impressioning Tools ................... 507, 543 Software ............................ 506, 511, 523 ADA Force Gauges ............................. 532 Installation Jigs & Tools .... 496–498, 511, Spanner Keys ..................................... 496 Auto Wedges ...................... 502–503, 542 524–525, 532–533, 535–536, 545 Spray Paint ........................................ 532 B K Spring Steel ....................................... 508 Backset Markers ................................ 513 Key Blocks ......................................... 496 Staking Tools ..................................... 525 Ball Picks ........................................... 520 Key Decoders ..................................... 514 Stamping Tools .................. 497, 514, 547 Belt Pick Sets ..................................... 517 Key Hooks .................................. 495, 539 Strike Markers ........................... 513, 536 Books & Manuals ....................... 505, 542 Keying Kits ......................... 494–496, 525 T Bottom Pins ............................... 493, 526 Keying Tools ...................................... 537 Tap & Die Tools.......................... 508–509 Butter Bits ........................................
    [Show full text]
  • Southord Locksmith Tools
    SOUTHORD LOCKSMITH TOOLS Through innovation, quality control, and our insatiable drive to improve, Southord Locksmith Tools have become the industry standard for excellence. All of our picks are manufactured from the finest full hard spring stainless steel, making them the strongest, most durable picks available - with the added advantage of being rustproof. Other companies utilize riveted construc- tion to attach their handles - a method in which rough surfaces are inherent. We developed a better way. Our exclusive rivetless construction leaves the stainless steel handles smooth from end to end, making Southord picks both beautiful and comfortable to use. Each set of our premium quality tools comes to you in a soft, luggage quality, top grade leather case, providing secure, handsome storage. Compare - and like so many others, you’ll discover the Southord advantage. Thank you for choosing Southord tools. Others use old technology materials and construction Rust prone carbon steel Rough riveted construction SOUTHORD Lock Picks Utilize the newest high technology steels and construction methods Rust proof, full hard spring stainless steel Comfortable, smooth rivetless construction Items are enlarged to show detail. Actual size 3 1/2" long and 1/4" thick. JACKKNIFE LOCK PICK SET The JPXS-6 Jackknife Lock Pick Set, an overnight success, has become our signature product. The finest set of its kind, the JPXS-6 now features improvements that bring it to near perfection; tempered stainless steel picks, knurled stainless steel set screw for a positive lockup, and a hard alloy handle for increased durability. Patents pending. JPXS-6 FEATHERWEIGHT JACK- KNIFE LOCK PICK SET The newest in our line of lock picks, and companion to the JPXS-6, is our fiber- glass/polymer handle Jackknife Lock Pick Set.
    [Show full text]