home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
miscpub1
/
phys.tj2
< prev
next >
Wrap
Text File
|
1992-09-26
|
31KB
|
704 lines
The LOD/H Technical Journal: File #5 of 10 (ISSUE #2)
Lex Luthor and The Legion Of Doom/Hackers Present:
Identifying, Attacking, Defeating, and Bypassing
Physical Security and Intrusion Detection Systems
PART II: THE EXTERIOR
INTRODUCTION:
-------------
The 'exterior' refers to the area directly outside of a building and the
things
within the building which are on the exterior. These obviously are: doors,
air
conditioning ducts, windows, walls, roofs, garages, etc. I don't believe the
word 'exterior' is the exact definition of what this article will encompass,
unlike the 'perimeter', but it's the best I could come up with. This article
primarily is of an informative nature, although methods of "attacking,
defeating, and bypassing" will be explained. Its purpose is not specifically
to
encourage you to breach a facility's security, although I acknowledge that it
could be used as such. Some of the devices mentioned in the physical security
series are used in homes as well as corporate, industrial, and military
installations, but my aim is specifically towards the commercial aspect of
buildings, not homes and apartments. Entering a facility to obtain
information
such as passwords or manuals is one thing, breaking into someones' home to
steal their personal belongings is another.
THE EXTERIOR:
-------------
A facility's second line of defense against intrusion is its' exterior. The
exterior may have any or all of the following:
* Window breakage detectors
* Keypad systems
* Card access control systems
* Magnetic locks and contacts
* Security lighting and CCTV
CCTV which is also used, was mentioned in Part I: The Perimeter.
Card Access Control devices will be mentioned in Part III: The Interior.
WINDOWS:
--------
Windows are a large security hole for buildings. You may notice that many
phone
company buildings and data processing centers have few if any windows. There
are two things that can be done to secure windows aside from making sure they
are locked. One is to make them very difficult to break, and the other is to
detect a break when and if it occurs. Here is a quick breakdown of the common
types of glass/windows in use today:
Plate glass: Can be cut with a glass cutter.
Tempered: Normally can't be cut. Breaks up into little pieces when broken.
Safety: You need a hatchet to break this stuff.
Wire: This has wire criss-crossed inside of the glass, making it very hard to
break, and even harder to actually go through the opening it is in place of.
Plexy: Very hard to break, doesn't really shatter, but can be melted with the
use of a torch.
Lexan: This is used in bulletproof glass. One of the strongest and most
secure
types of glass.
Herculite: Similar to Lexan.
Foil tape:
----------
This is by far the most common, and probably the most improperly installed
form
of glass breakage detection, which also makes it the most insecure. This is
usually a silver foil tape about 5/16" wide which should be placed on the
whole
perimeter of a glass window or door. In the case of plexyglass or a similar
material, the tape should be placed in rows separated by 6-12 inches.
The older foil was covered with a coating of eurathane or epoxy which enabled
it to stick onto the glass. The newer foil has an adhesive back making
installation much easier. There should be two connectors which are located at
the upper top part of a window, and the lower part of the window which
connects
the foil to the processor, thus, completing the circuit. Foil may or may not
have a supervised loop. If it is supervised, and you use a key to scratch the
foil (when it is turned off) making a complete break in it, an alarm will
sound
when it is turned on.
Foil is commonly used as a visual deterrent. Many times, it will not even be
activated. The easiest way to determine if the facility is trying to 'B.S.'
you
into thinking they have a security system, is to see if there are any breaks
in the foil. If there is a clean break, the 6-12V DC current which is
normally
making a loop isn't. Thus, breaking the glass will do nothing other than make
some noise unless you take steps against that happening.
As was stated, foil is the most improperly installed type of glass breakage
detection. When it is installed improperly, it will not cover all the area it
should. An easy way to defeat this is by the following diagram:
+-------------+
! ........... !
! . . ! . = foil tape
! . put . ! - = top/bottom of door
! . contact . ! ! = sides of door
! . paper . ! / = dividing line between 2 pieces of contact paper
! . in . ! $ = ideal places for initial breakage
! . this +-! ' = clear area or outline of second piece of contact paper
! . area ! ! <-- door handle
! . +-!
! . . !
! ........... !
!/////////////!
!'''''''''''''!
!' '!
!$'''''''''''$!
+-------------+
As you can see, the installer neglected to place the foil all the way down to
the bottom of the glass door. There is enough room for a person to climb
through. They may have thought that if someone broke the glass, it would all
break, which is normally correct. But if you obtain some strong contact
paper,
preferably clear, adhere it to the glass as shown, and break the bottom part
at
the '$' it will break up to the '/' line and thats it. Thus, leaving the foil
in-tact. This will work on tempered glass the best, and will not work on
Lexan
or Plexyglass. There is a transparent window film with a break strength of up
to 100 pounds per square inch which can be obtained from Madico, Inc. It is
called, Protekt LCL-400 XSR, and makes glass harder to break and stays
essentially in place even when broken. This can be used in place of the
contact
paper. Obviously, it is also used to protect glass from breakage.
Audio discriminators:
---------------------
What these do is to compare the frequency of the sound that glass makes when
it
breaks, to the actual breakage of glass. This frequency is relatively unique,
and can accurately determine when and if glass actually breaks. Your best
shot
at defeating this, is to do the same thing as mentioned above. Cover the
glass
with a film which will keep the glass in place after breaking it. If you
break
it properly, the frequency will not match that of glass breaking when it is
not
held in place.
Glass shock sensors:
--------------------
These devices detect shock disturbances using a gold-plated ring that
"bounces"
off a pair of normally closed gold-plated electrical contacts. This will send
a signal to a Signal Processor (SP) which determines whether an alarm
condition
exists. There are two settings the SP can be set to which are:
SHOCK-BREAK: This mode requires an initial high energy shock, followed by a
very low engery shatter. The shatter must occur within about 1 second before
an alarm can occur.
SHOCK-ONLY: An alarm will occur once the first shock is detected. This may or
may not be accompanied by a shatter.
Obviously the more secure setting for a facility would be shock-only. Though,
both are equally dangerous for an intruder. The methods mentioned earlier
about
preventing the glass from shattering will not work when this device is used
in
the shock-only mode. It may work, depending on the type of glass, if it isn't
in the shock-break mode.
These devices are usually found protecting large plate glass and multi-pane
windows. They are roughly 2 inches by 1 inch and can be mounted on the frame
of
a window, between two windows, or on the glass itself. These sensors can
cover
up to 150 square feet of glass.
These are the best of the lot for window breakage detection. Most devices
have
a constantly supervised loop, and if you cut a wire, that loop will break,
and
cause an alarm condition. They are typically placed somewhere on the window
pane and not on the window, thus, making them harder to visually
detect...from
the outside that is. Though from close inspection, you may be able to
determine
if these are in place. Obviously they can easily be seen from the inside...
The sensor is normally placed no more than a couple of inches from the glass.
If it is too far away, or if you can move one over 4 inches from the glass,
its
detection capability is somewhat diminished. It is probably screwed in, and
has
an adhesive backing, so moving it may not be too easily accomplished. False
alarms are not common, unless the windows rattle. There are sensors available
which are not as sensitive, and will not "overreact" to slight vibration,
these
are called "damped" sensors.
MAGNETIC CONTACT SWITCHES:
--------------------------
The word "contact" is somewhat contradictory to how these devices are
commonly
used. In most cases, the magnet and the switch are not in physical contact of
each other, rather, they are in a close proximity of each other, although
there are some models which are indeed in contact with each other. There are
various types and levels of security that these devices possess.
They can be surface mounted (floor or wall mounted) or concealed (recessed).
The most common are surface mounted which are placed on top of the door. When
inspecting for these devices, examine the whole perimeter of the door, from
top
to bottom. Most doors have a +/- 1/4" gap all the way around, in which you
should also check for concealed contacts. These are round cylinders that are
recessed into the door or wall, which obviously makes them less visible. The
other contacts range from miniature, with dimensions as small as 1x1/4x1/4"
to the larger ones at 5x2x1". They are usually in colors of off-white, grey,
and brown and are mounted with nails, screws, double sided tape, or are
epoxied
onto the door or wall surface(s). The switches are hermatetically sealed, as
are the glass breakage detectors mentioned earlier, can operate in moist or
dusty areas, are corrosion resistant and have indoor/outdoor use. They can
also
be used on windows, fence gates, truck trailors, boats, heavy equipment,
safes,
and vaults.
The different types of devices in order of least to most secure are:
1) Standard Magnetic Contacts: These consist of one reed switch and one
magnet.
They may be defeated with the use of a second magnet which would be placed
in the vicinity of the switch, while opening the door or window and while
closing them also. This way, the switch never detects the abscense of the
magnet, thus, no alarm occurs.
2) Biased Magnetic Contacts: These consist of one reed switch with a
"biasing"
magnet that changes the state of the reed switch. The magnet is then
placed
at the correct distance to offset the bias magnet, creating a "balanced"
condition. The switch can be defeated with the use of a single magnet. The
trick is to:
A) You must have the correct size magnet, which can be accomplished by
obtaining the same type or model as what is in place.
B) You must determine the correct polarity which may be accomplished
with
either a compass, or if the alarm is not activated, (possibly during
normal business hours), by opening the door and placing your magnet
near the device's magnet and determine the polarity. If you do not
have
much time, then its a 50-50 shot.
C) The last criteria is to keep the magnet at the same or close to the
same distance from the switch as the original magnet was. In some
cases
the device will be placed in such a manner that correct placement of
the second magnet will be difficult if not impossible.
3) Balanced Magnetic Contacts: These consist of one biased reed switch and
one
unbiased reed switch. The second reed will be of the correct sensitivity
and position so as to not operate with the actuator magnet. It must also
operate with the addition of a second magnet. It could be defeated by a
single magnet that is moved into place as the door is opened. This
requires
coordinated movement of the door and magnet.
4) Preadjusted Balanced Magnetic Contacts: These consist of three biased reed
switches and may have an optional fourth tamper reed. Two reeds are
polarized in one direction and the third is polarized in the opposite
direction. The housing consists of three magnets with the polarity that
corresponds to the switches. It is preadjusted to have a fixed space
between
the magnet and the switch. This is the most secure type of magnetic
contact
switch. The three-reed type could be defeated by using one of its own
magnets, but not a bar magnet. The type with four reeds cannot be defeated
with either of the two magnets because the fourth reed will activate when
a magnet is brought within actuating distance. If you are able to
determine
which is the tamper reed, you can try to keep the three magnets in contact
with the corresponding reeds. At the same time you must have the correct
polarity, and in the process, not activate the tamper reed. If you
accomplish those, you may be able to defeat it. This will most likely
require two people and a bit of luck.
The most secure devices are made of die cast aluminum instead of plastic,
are explosion proof (for vaults and safes), have terminals mounted inside
the housing which provides protection from tampering and shorting, and
have
armored cabling.
A wider break distance will prevent fasle alarms due to loose fitting doors,
thus, if the door is loose fitting it may have a wide break distance. The
wider
the break distance, the easier it is to defeat. This will allow you to
introduce another magnet in cramped places since the door can be opened a
wider
distance before an alarm condition occurs.
Some devices allow the installer to adjust the gap with a screwdriver instead
of placing the switch a certain distance from the magnet. In some devices,
use
of any ferrous (Iron) material in the vicinity of the switch can cause a
change
in gap distance. As a gap is increased, the switch may bias and latch. When
latched, the switch will remain closed even when the magnet is removed!! This
means that when you open the door, it thinks that the door is closed, and you
are able to stealthily go thru the door. You can test for a latched condition
by removing the magnet (opening the door) and using a Volt Ohm Meter, if it
reads INFINITY, the switch is OK. If not, it may be latched. If you can
adjust
the gap to the point of it being latched, without being noticed, you've got
it
made.
Wireless Switch Transmitters:
These are essentially the same as the other devices mentioned except that
they
use an FM digital signal for alarm conditions (a door or window open) and for
maintenance conditions (low battery, transmitter malfunction/removal, long
term
jamming, etc). There should be continuous polling and a maintenance alarm
will
occur if the signal is missing for a few minutes. The transmitters are
usually
powered by a couple of AAA 1 1/2V pen cells, which can last a few years. Most
devices will send out a signal after a specific interval. Common intervals
are
about every 30 seconds. You can verify if the device is indeed sending out a
signal by placing a milliammeter capable of reading 10 ua in series with the
batteries and reading the discharge current. If it occurs every 30 seconds,
then it is sending out a signal every 30 seconds. A hint that this type of
device is in use, is since range generally decreases as a transmitter gets
closer to the floor, the transmitter will be placed as high as possible. The
transmitter probably has a range of about 200 feet, although some
environments
may reduce this range due to construction materials inherent in the building.
The frequency should be in the 314 MHz range.
As was mentioned, these are the same as regular magnetic contact switches
except that there is a transmitter instead of a wire for transmitting alarm
and
maintenance conditions, thus, the switch can be defeated in the same manner
as
has been previously stated. Defeating an X-mitter is much easier than
defeating
a wire. You can defeat the transmitter if you can sufficiently block or
diminish the signal strength so that the receiver is unable to receive it.
Radio waves have a tendency to bounce and reflect off of metallic surfaces,
which includes foil, and pipes. If you have located the transmitter, which
should be attached to or near the actual contact, you can block or jam the
signal as you open the door. Hopefully this will be between the 30 second
interval that it sends an "i'm ok" signal to the receiver, but it's not
critical to do so. As was stated, most receivers will not cause an alarm
condition if it doesn't recieve a signal once or twice, but after a few
minutes
it will. So, as you open the door, it tries to send the signal, you block or
jam it, and you slip through without detection.
This information can also apply to security relating to the 'interior' of a
facility, ie. Part III of this series. Many of the techniques for defeating
magnetic contact switches are geared toward being inside the facility. Many
facilities have switches on doors to monitor movement of personnel within the
facility. But it also is used on the exterior and some methods will work on
doors and possibly windows on the exterior. Of course, you have to have a way
of opening the door, and that follows.
DOORS AND LOCKS:
----------------
As you know, doors are the primary entrance point into a building. Since they
are the primary target for unauthorized entry, they have the most security
added. I am not going to mention anything about the art of picking locks.
Although mechanical locks and keys have been the most common type of security
used in the past as well as today, I am going to concentrate on the more
advanced security systems in use.
Pushbutton keypad locks:
------------------------
There are two types, mechanical and electronic. I will go into detail about
each. I will give you a few examples of these devices which comes directly
from
brochures which I have been sent. I am merely summing up what they said.
Electronic:
Securitron DK-10:
This is a unit which has dimensions of 3x5x1". It has a stainless steel
keypad
which is weatherproof, mounts via hidden screws and has no moving parts. The
keypad beeps as each button is pressed, and an LED lights when the lock is
released. It is slightly different in appearence than most other electronic
keypads:
+----+
! 1A ! Each block (1A/B2) is one button. Thus, there are 5 buttons total on
! B2 ! this device. The "/"'s at the bottom of the device represents the
name
! ! of the company and possibly the model number of the device.
! 3C ! (ie. Securitron DK-10). It has 2-5 digit codes. Thus, a 2 digit code
! D4 ! will have a maximum of 5 the the 2nd power (5 squared=25)
combinations.
! ! Of course it increases as the number of digits used increase.
! 5E ! This unit has an 11 or 16 incorrect digit threshold. If it is reached
! F6 ! a buzzer sounds for 30 seconds during which it will ignore any
entries.
! ! When a valid code is entered, the lock is released for a 5, 10, 15 or
! 7G ! 20 second interval.
! H8 !
! !
! 9K !
! L0 !
! !
!////!
!////!
+----+
Sentex PRO-Key:
This device has a keypad resembling one of a payphone. It is a sealed, chrome
plated metal keypad. It has the standard 10 digits with * and #. It can have
up to 2000 individual codes with a lenght of 4 or 5 digits. It allows 8 time
zones, "2-strikes-and-out" software which is its invalid code threshold, and
anti-passback software.
Obtaining codes--
Your aim is to obtain the correct code in order to open the door. Plain and
simple. There are various methods in which you can accomplish this. You can
try
to obtain a telescope or similar device and attempt to get the exact code as
it
is being entered. This is obviously the quickest method. If you cannot
discern
the exact code, the next best thing is to determine exactly how many digits
were entered, since most devices have variable code lengths. If you can make
out even one digit and when it was entered, you will substantially reduce the
possibilities. Another method is to put some substance on the keypad itself,
which preferably cannot be noticed by the user. After someone enters a code,
you can check the keypad to see where there are smudges or if you use what
the
police use to find fingerprints, you can see what digits were pushed,
although
you will have no idea in what order. This will drastically cut down the
combos.
Say that someone enters a 5 digit code on a 10 digit keypad. You check the
keypad and see that, 1,2, 4, 7, and 9 were pushed. If you attempted brute
force, you will have 25 combinations to try. If a 4 digit code 'appeared' to
be
entered, as 0, 2, 4, 8 were 'smudged', it is possible that one of the digits
were pushed twice. Keep that in mind. A way to know for sure would be to
clean
the pad and 'dust' it, most fingerprints will be clear, but one will be less
clear than the others. Thus, you can be reasonably sure that the digit which
is
smudged was pressed twice.
Thresholds--
Brute force attempts on electronic keypads is suicide. Once a certain number
of
invalid attempts has been reached, it will probably be logged and a guard may
be dispatched. Your best bet is to try once or twice, wait (leave), try once
or twice again, wait, etc. Sooner or later you will get in.
Auditlogs--
Many of these devices are run on micro's. The software that runs these
devices
allows for an increased ability to monitor the status of these devices. They
can track a person throughout the facility, record times of entry and exit,
and when the maximum invalid code threshold is reached.
Anti-passback--
This term is commonly used in card access control, but it applies differently
to keypads. This feature prevents the use of two codes being used at the same
time. That is, Joe Comosolo uses code #12345 and enters the building. Then,
you enter Mr. Comosolo's code, #12345 but the system knows that Joe is
already
in the building, and has not entered his code before leaving. Thus, you do
not
gain access, and that action is most likely recorded in the audit log. This
option will only be in effect when:
1) Each individual has a different code.
2) There is a keypad used for entry, and a keypad used for exit.
Tailgating--
This occurs when more than one person enters through a controlled access
point.
Joe enters his code, and goes into the building. You follow Joe, and make it
in just before the door closes, or in the case of the devices waiting 10 or
20
seconds before the door locks again, you let it close, and open it before it
locks.
Open access times--
During peak morning, noon, and evening hours, a facility may set the system
to
not require a code during, say, 8:55AM to 9:05AM, thus, enabling most anyone
to
gain entry during that time.
Hirsch Electronics Digital Scrambler:
This has a 12 button arrangement with the addition of a 'start' key. This is
probably the most secure type of keypad security system in use today. It only
allows a viewing range of +/- 4 degrees horizontally and +/- 26 degrees
vertically. This means that it would be very difficult to watch someone enter
their code, thus, eliminating the 'spying' technique mentioned earlier.
The buttons on the keypad remain blank until the start button is pressed.
Then,
instead of the numbers appearing in the usual order, they are postitioned at
random. A different pattern is generated each time it is used. The numbers
are
LED's in case you were wondering. This eliminates the 'dusting' technique
which
can be used on the other types of keypad systems.
The Model 50 allows control of 4 access points and has 6 programmable codes.
The Model 88 controls 8 doors and has thousands of codes. The features that
this device has makes it very difficult to do anything but use brute force to
obtain the code, but since it is controlled and monitored by a computer, the
audit logs and maximum invalid code threshold can put a stop to that method.
The other alternative, which applies to any of these systems, is to socially
engineer the code from someone, or if you know someone, they may give you it.
Both methods are not ideal. I have come up with a way to reduce the
possibilities to a very reasonable level, but I will not explain it here. If
you are really interested, contact me via the LOD/H Technical Journal Staff
account on the Sponsor boards.
Mechanical Keypad locks:
The best thing about these types of locks, is that they are 100% mechanical.
This means that it is not computerized, and there is no monitoring of bad
codes
or the door staying open for too long, or anything! All you have to worry
about
is getting a correct code. Probably the largest manufacturer of these
devices,
is Simplex Security Systems, Inc. The devices are called, Simplex Keyless
Locks. Every lock of theirs that I have seen, has 5 buttons. Combinations may
use as many of the five buttons the facility cares to use. The biggest
problem
with this type, is that there is the option of pushing 2 buttons at the same
time, which would be the same as adding another button to the lock. Thus,
button 1 & 5 can be pushed simultaneously, then button 3, then buttons 2 & 4
would be pushed at the same time.
These are supposedly, 'keyless locks' but on many models, a 'management key'
can be used to override the security code, so obtaining the key, is a way to
bypass the code. Both the spying and dusting methods apply to these devices,
and the best thing is that you can try all possiblities you want without an
alarm signalling.
Magnetic locks:
---------------
These are commonly called 'Magnalocks' and use only the force of electro-
magnetism to keep a door shut. Typically, the magnet is mounted in the door
frame and a self aligning strike plate is mounted on the door. These locks
provide the capability of up to a few thousand pounds of force for security.
They are not only found on doors, but can be put on sliding doors, glass
doors,
double doors and gates. The magnet and plate is roughly 3 inches by 6-8
inches.
There are a few things you should try to findout about these devices before
attempting anything:
Is there backup power? (ie. Usually a 12-24V battery can be used) Obviously,
if
there is no backup power and there is a power outage, there will be nothing
to
stop you from opening up the door.
Most devices have the capability to monitor whether the door is closed, which
is what magnetic contact switches do. But there is another option, which will
provide a voltage output signal on a third wire, which determines whether the
lock is powered and secure. If there is no monitoring of whether the door is
secure, then there is no way of knowing it is locked, unless it is physically
checked. There are optional LED's which can be mounted on the lock to
indicate
its status. For the Securitron Magnalock, an amber LED will indicate that the
lock is powered. A green light shows the lock is powered and secure. Red,
shows
that the lock is unlocked, and no light means there is a violation, ie. the
power switch is on, but the lock is not reporting secure. You can use these
lights to your advantage.
If a magnalock is tied into a fire alarm system, such that it is
automatically
released in the event of fire, then you or an accomplice can signal a fire
alarm and sneak in while the lock releases.
MISCELLANEOUS:
--------------
LED's: Some devices or models of devices have LED lights built into/onto the
device. They are usually used to indicate a secure or insecure condition.
This applies to magnetic contacts, shock sensors, and other devices. Even
when
the security system is not in a secure mode, (for example, during regular
business hours a system may be off, but after 6pm it is turned on) the LED
will
light when an alarm condition occurs. For example, you bang on a window that
has a shock sensor, and the red LED lights, or blinks for a few seconds. You
can use this to your advantage to test theories or methods during a time
which
a receiver pays no attention to the signals sent to it. Then when it is
turned
on, you will have more confidence in what you are doing.
Supervised loops: Most if not all devices will have supervised loops for
constant monitoring of battery power, electrical shorts, and defective
devices.
If the security system of the facility is very old, loops may not be
supervised, and simply cutting a wire will disable the alarm.
Naming of devices: For large orders, manufactures of security devices may put
the facility's name on the product instead of their own. This is probably for
esoteric purposes. This hampers your efforts in obtaining the name of the
maker of any type of product for purposes of geting additional information
and
brochures on the device.
Single person entry: These devices include mechanical and optical turnstiles
which meter people in and out one-by-one. Mantraps, usually found in high
security installations are double-doored chambers which allow only one person
in at a time, and will not allow the person out until the system is
satisfied
he is authorized.
Extreme weather conditions: Unlike perimeter security devices, most exterior
security devices are either placed inside the facility, or can withstand just
about any type of environmental condition, so there is not much that you can
take advantage of.
CONCLUSION:
-----------
People typically make security a lower priority than less important things.
Those who do not upgrade their systems because of spending a few dollars are
rewarded by being ripped off for thousands. I have no pity for those who do
not believe in security, physical or data...
ACKNOWLEDGEMENTS:
-----------------
Gary Seven (LOH)
And of course, the information from brochures, and questions answered by the
nice technical support people for the companies specifically mentioned in
this
article.
(>
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+