英语august

The security hole that Bitdefender found in the August Smart Lock Pro + Connect won’t let a hacker open your front door, but it could give a very patient one full access to your Wi-Fi network.

Bitdefender在August Smart Lock Pro + Connect中发现的安全漏洞不会让黑客打开您的前门,但是它可以让非常有耐心的人完全访问您的Wi-Fi网络。

By Neil J. Rubenking

尼尔J. Rubenking

There’s no question, smart door locks are incredibly convenient. Features like unlocking the front door with a phone app, logging all entries, and automatically locking up when you leave the area are great. If you’re engaged in the short-term rental business, choosing the right smart lock means you can give renters temporary access during their stay, with no need for the messy business of exchanging house keys. Even so, you might have just a little concern in the back of your mind. Hackers got into Kanye West’s Twitter account, after all. Maybe they could open your front door? If you use the August Smart Lock Pro + Connect, that’s not the problem. Your front door should stay locked even if a whole hacker krewe marches past chanting, “Open Sesame!” That said, an unpatched security hole in this device means those hackers could gain full access to your Wi-Fi network, which could be its own kind of disaster.

毫无疑问, 智能门锁非常方便。 诸如使用电话应用程序解锁前门,记录所有条目以及在您离开该区域时自动锁定等功能都很棒。 如果您从事短期租赁业务,则选择正确的智能锁意味着您可以在房客逗留期间为他们提供临时访问权限,而无需进行繁琐的房门钥匙交换业务。 即使这样,您的脑海中也可能只有一点点担心。 毕竟,黑客进入了Kanye West的Twitter帐户。 也许他们可以打开您的前门? 如果您使用August Smart Lock Pro + Connect , 不是问题。 即使整个黑客团伙都在高呼“芝麻开门!”,您的前门也应该保持锁定状态。 也就是说,此设备中未打补丁的安全漏洞意味着这些黑客可以完全访问您的Wi-Fi网络,这可能是其自身的灾难。

PCMag has partnered with the Internet of Things security team at Bitdefender to answer just that sort of question. Bitdefender’s hacking team puts popular smart home devices to the test, looking for security holes that hackers could misuse. On discovering a problem, the team contacts the manufacturer, to give it time for a fix before disclosing the vulnerability. In the past, Ring has fixed a security problem with one of its smart doorbells that would have allowed a patient hacker to gain full access to the Wi-Fi network to which the device was connected. Belkin likewise fixed a similar problem with its WeMo Smart Plug. When consumers get a more secure product, everybody wins.

PCMag已与Bitdefender 的物联网安全团队合作,以回答此类问题。 Bitdefender的黑客团队对流行的智能家居设备进行了测试,以寻找黑客可能滥用的安全漏洞。 发现问题后,团队将与制造商联系,以便在披露漏洞之前有时间进行修复。 过去,Ring通过其智能门铃之一解决了一个安全问题 ,该问题使患者黑客可以完全访问该设备所连接的Wi-Fi网络。 Belkin的WeMo Smart Plug也解决了类似的问题。 当消费者获得更安全的产品时,所有人都会赢。

Things happened a bit differently in our investigation of the iBaby monitor. The Bitdefender team found a way for any owner of the camera to get access to pictures and videos from every such device. The company notified iBaby, without response. But after we published the news, iBaby pushed out a fix within a few days. That’s another win, albeit a delayed one.

在我们对iBaby显示器的调查中,情况发生了一些变化。 Bitdefender团队找到了一种方法,使相机的任何所有者都可以从每个此类设备访问图片和视频。 该公司通知iBaby,但没有回应。 但是,在我们发布新闻之后, iBaby在几天之内推出了修复程序 。 那是另一个胜利,尽管是一个延迟的胜利。

August智能锁的智能程度如何? (How Smart Is the August Smart Lock?)

For the latest round of testing, the Bitdefender team, led by ethical hacking expert Alex “Jay” Balan, dug into the August Smart Lock Pro + Connect. This one has been a favorite of ours in the past and when we reviewed it in 2017, earned our Editors’ Choice badge. August recently released a version with integrated Wi-Fi that also won an Editors’ Choice award. Released three years ago, the Pro edition is an older lock, but you can be sure there are plenty of them installed on doors all over the country.

对于最新一轮的测试,由道德黑客专家Alex“ Jay” Balan领导的Bitdefender团队深入研究了August Smart Lock Pro + Connect。 过去一直是我们的最爱,当我们在2017年对其进行审查时,获得了我们的编辑选择徽章。 August最近发布了带有集成Wi-Fi的版本,该版本也获得了编辑选择奖。 Pro版本是3年前发布的,是一种较旧的锁,但是您可以确定全国各地的门上都安装了许多锁。

You control the lock using a smartphone app. If you’re within range, communication is managed via Bluetooth Low Energy (BLE). If not, the app connects through the internet to the Connect bridge (that’s where “+ Connect” comes from) which, in turn, controls the lock. The security team found that all commands between the devices are encrypted and “cannot be intercepted or modified.” In addition, the bridge to the Connect device only works if the user has an August lock registered to the account.

您可以使用智能手机应用程序控制锁。 如果您在范围内,则通过蓝牙低功耗(BLE)管理通信。 如果不是,则该应用程序通过互联网连接到Connect桥(这是“ + Connect”的来源),然后由该桥控制锁定。 安全团队发现,设备之间的所有命令均已加密,并且“无法被拦截或修改”。 此外,仅当用户在帐户中注册了August锁时,才能连接到Connect设备。

Access to the account is secured and uses two-factor authentication. Only the owner has full control. Among the owner’s powers are the ability to give others full access, or just limited access. Without that access permission, hackers can’t open the door, period. There’s just one little problem, one very similar to what we encountered with the Ring Video Doorbell…

对帐户的访问是安全的,并使用两因素身份验证 。 只有所有者拥有完全控制权。 所有者的权力中包括授予他人完全访问权限或仅授予有限访问权限的能力。 没有该访问权限,黑客就无法打开门。 只有一个小问题,一个非常类似于我们在环形视频门铃中遇到的问题…

环的解决方案 (Ring’s Solution)

Like the Ring Video Doorbell, August needs a connection to your local Wi-Fi network. With no keyboard or other input device, you can’t just type in the username and password. Both devices use a common technique to manage the initial connection. You put the device in setup mode, which causes it to act as an access point. You connect to that access point using your smartphone. And the app passes the Wi-Fi login credentials to the device.

像Ring Video Doorbell一样 ,August需要连接到本地Wi-Fi网络。 没有键盘或其他输入设备,您不能只输入用户名和密码。 两种设备都使用通用技术来管理初始连接。 您将设备置于设置模式,这将使其充当接入点。 您可以使用智能手机连接到该接入点。 然后,该应用会将Wi-Fi登录凭据传递到设备。

Bitdefender’s team discovered a problem with this system. That exchange of credentials was not protected in any way. An intruder listening in to the network, even without logging in to the network, could capture the Wi-Fi credentials and thereby gain full access. Admittedly, the intruder must be listening at the exact moment the exchange takes place, but the researchers found a way to force reentry of the credentials.

Bitdefender的团队发现了该系统的问题。 凭证交换没有得到任何保护。 入侵者即使没有登录网络也可以监听Wi-Fi凭据,从而获得完全访问权限。 诚然,入侵者必须在交换发生的确切时刻进行监听,但是研究人员找到了一种强制重新输入证书的方法。

Implementing this hack would take a lot of patience. The hacker would have to find a spot close enough to listen in on the Wi-Fi network, perhaps a parked car. The attack that forces the doorbell offline takes time. And the device doesn’t reconnect until its owner notices that it’s offline and initiates the exchange.

实施此hack需要大量的耐心。 黑客必须找到一个足够近的地点,以监听Wi-Fi网络,也许是一辆停着的汽车。 迫使门铃脱机的攻击需要时间。 并且,只有在设备拥有者注意到设备已离线并启动交换后,设备才会重新连接。

Ring quickly fixed the problem by adding encryption to the credential hand off exchange.

Ring通过在凭证切换交换中添加加密来快速解决该问题。

It’s worth noting that a vast number of IoT devices use a similar technique to connect with your Wi-Fi network. Any device that doesn’t encrypt the credential exchange would be vulnerable to this attack.

值得注意的是,大量的物联网设备使用类似的技术来连接您的Wi-Fi网络。 任何不加密凭据交换的设备都容易受到此攻击。

默默无闻的安全性永远行不通 (Security Through Obscurity Never Works)

The developers at August made a good start at handling things better. They built in encryption from the start, so a network snoop couldn’t simply grab the Wi-Fi password, but they hard-coded the encryption key in the device’s firmware.

8月的开发人员为更好地处理问题开了一个良好的开端。 它们从一开始就内置了加密功能,因此网络监听无法简单地获取Wi-Fi密码,而是将加密密钥硬编码在设备的固件中。

They tried to hide it. According to Bitdefender, the key itself is encrypted using an extraordinarily simple cipher called ROT-13, for rotate 13. Picture two disks with the 26 letters around the edge. Rotate one by 13 places. Now A becomes N, B becomes O, and so on. It’s not exactly rocket science. The developers relied on obscuring the key rather than actually protecting it.

他们试图隐藏它。 据BitDefender的,关键本身是加密的使用极其简单的密码叫做ROT-13,用于旋转13图片两次与周围边缘的26个字母盘。 将其旋转13个位置。 现在,A变为N,B变为O,依此类推。 这不完全是火箭科学。 开发人员依靠隐藏密钥而不是实际保护密钥。

For precise details of what the team found, and how a hacker could steal your Wi-Fi networks login credentials, you can read Bitdefender’s whitepaper or blog post on the subject.

有关该团队发现的内容以及黑客如何窃取您的Wi-Fi网络登录凭据的确切详细信息,您可以阅读Bitdefender的白皮书或有关该主题的博客文章 。

是固定的吗? 好吧,不 (Is It Fixed? Well, No)

Bitdefender notified August of this problem last December. August responded with a proposal for mutual disclosure to take place in June of 2020. After that, communication broke down. Bitdefender continued trying for a few more months, but eventually opted to disclose the problem. Under responsible disclosure protocols, researchers who find a problem typically give the company 90 days to devise a fix. In this case, Bitdefender waited almost three times as long.

去年12月,Bitdefender将此问题通知了八月。 作为回应,8月提出了一项相互公开的提议,提议于2020年6月进行。此后,沟通中断了。 Bitdefender继续尝试了几个月,但最终选择揭露该问题。 根据负责任的披露协议,发现问题的研究人员通常会给公司90天的时间来设计解决方案。 在这种情况下,Bitdefender等待的时间几乎是原来的三倍。

黑客能做什么? (What Could Hackers Do?)

So, the bad news is that a very patient hacker could gain full access to your Wi-Fi network by using this security hole. I checked in with Bitdefender’s Jay Balan for some thoughts on just how bad. “People believe their home networks are secure,” noted Balan. “All of us suffer from this bias. All of us feel something is safe because it’s on our private network. As such, all our security measures are extremely relaxed in our home networks.”

因此,坏消息是,非常有耐心的黑客可以通过使用此安全漏洞来完全访问您的Wi-Fi网络。 我在Bitdefender的Jay Balan处检查了一些关于到底有多糟糕的想法。 “人们相信他们的家庭网络是安全的,” Balan说。 “我们所有人都遭受这种偏见。 我们所有人都觉得有些安全,因为它在我们的专用网络上。 因此,我们的所有安全措施在我们的家庭网络中都极为放松。”

He went on to point out some specific scenarios. Network printers communicate without encryption or authentication, so an attacker could capture and exfiltrate any documents you print. If you use a local Network Attached Storage (NAS) device for backups, chances are good it receives unprotected files for backup, once again giving the attacker full access. By monitoring the communications between IoT devices and other devices on the network, a hacker could gain control of those devices. Balan concluded, “Combining the comfort and safety you feel on your home private network with hacking techniques, hackers will have an easier time trying to social engineer users and steal their online credentials, launch phishing attacks and so on.”

他接着指出了一些具体情况。 网络打印机无需加密或身份验证即可进行通信,因此攻击者可以捕获和泄露您打印的所有文档。 如果您使用本地网络附加存储(NAS)设备进行备份,则很有可能会收到不受保护的文件进行备份,从而再次赋予攻击者完全访问权限。 通过监视IoT设备和网络上其他设备之间的通信,黑客可以控制这些设备。 Balan总结说:“将您在家庭专用网络上的舒适性和安全性与黑客技术相结合,黑客将可以更轻松地尝试向社交工程师用户窃取他们的在线凭据,发起网络钓鱼攻击等。”

八月的回应 (August’s Response)

We contacted August with our plans to release this report, requesting comment. The initial response emphasized August’s commitment to security, stating, “Maintaining our customers’ privacy and security are top priorities for us, as they are at the core of who we are as a company and how our products are created.” But it went on to describe the company’s response to a completely different problem, a hardware-based vulnerability dubbed Spectra. Interestingly, the Black Hat presentation on Spectra didn’t mention August at all, focusing on vulnerable Macs and smartphones.

我们与8月份联系,要求我们发布该报告的计划,请您发表评论。 最初的回应强调了August对安全的承诺,并指出: “维护客户的隐私和安全是我们的重中之重,因为他们是我们公司形象和产品创造方式的核心 。” 但是它继续描述了该公司对一个完全不同的问题的回应,这个基于硬件的漏洞被称为Spectra。 有趣的是, 有关Spectra的Black Hat演示根本没有提到August,而是针对易受攻击的Mac和智能手机。

When we clarified our request for comment, an August representative stated, “The August team is aware of the vulnerability and is currently working to resolve the issue. At this time, we are not aware of any customer accounts affected.” This is encouraging, though not borne out by the company’s interaction with the Bitdefender team. The representative also said, “The attacker must know precisely when the customer is setting up the Connect device. Once the Connect is fully set up, it is no longer vulnerable to this attack.”

当我们澄清评论要求时,八月的代表说: “八月的团队知道该漏洞,目前正在努力解决此问题。 目前,我们尚未发现任何受影响的客户帐户。” 令人鼓舞的是,尽管公司与Bitdefender团队的互动并未证明这一点。 该代表还说: “攻击者必须准确地知道客户何时设置Connect设备。 一旦Connect设置完毕,就不再容易受到这种攻击。”

That last part is not actually true, given the Bitdefender crew’s documented technique for forcing setup to happen on demand. The statement also said that only connection with Android devices is affected, not iOS. Bitdefender confirmed that Apple’s enhanced security means the attack indeed doesn’t work with an iOS device. And it’s worth reiterating that this vulnerability in no way gives an attacker control of the lock itself.

考虑到Bitdefender团队记录的强制按需进行设置的技术,最后一部分实际上并不正确。 声明还说,仅影响与Android设备的连接,不影响iOS。 Bitdefender确认,Apple增强的安全性意味着该攻击确实不适用于iOS设备。 值得重申的是,此漏洞绝不会让攻击者控制锁本身。

When you turn the spotlight of penetration testing on any device, there’s a decent chance you’ll find a security hole. We don’t fault August for the mere fact that a flaw turned up. We do remain concerned by the company’s response, however. After eight months the flaw hasn’t been fixed, and the company’s statement suggests an incomplete understanding of what’s wrong.

当您在任何设备上关注渗透测试时,很有可能会发现一个安全漏洞。 我们不会责怪8月,因为光是出现了缺陷。 但是,我们仍然对公司的回应表示关注。 八个月后,该缺陷仍未得到修复,该公司的声明表明对该问题的理解不完整。

For more information on how to keep your smart home safe, read our guide.

有关如何保护智能家居安全的更多信息,请阅读我们的指南 。

Originally published at https://www.pcmag.com.

最初发布在 https://www.pcmag.com

翻译自: https://medium.com/pcmag-access/exclusive-august-smart-lock-flaw-opens-your-wi-fi-network-to-hackers-e19b64ba4145

英语august


http://www.taodudu.cc/news/show-5739767.html

相关文章:

  • 如何在Schlage Connect Smart Lock上启用休假模式
  • 如何为Schlage Connect Smart Lock创建和管理用户代码
  • August Smart Lock:终于等到你,一款真正值得夸的智能家居产品
  • 如何在Schlage Connect Smart Lock上启用警报
  • [NOTE]Android N SmartLock缺少很多功能
  • 如何安装和设置Schlage Connect Smart Lock
  • 防止 Google Smart Lock 记忆错的用户名
  • 如何在没有手机的情况下解锁Kevo Smart Lock
  • 如何为您的Kwikset Kevo Smart Lock启用自动锁定
  • 设置 安全 Smart Lock下没有Onbody detection选项
  • Chrome更新v68 Google Smart Lock 生成安全系数高的密码,如何去除
  • Android 解决Smart Lock 打不开的问题
  • 如何充分利用您的Kwikset Kevo Smart Lock
  • smart 200密码忘记_如何阻止某些Android应用与Smart Lock同步密码
  • 如何安装和设置Kwikset Kevo Smart Lock
  • Android支持Smart Lock 人脸解锁
  • android smart lock,使用Smart Lock自动解锁您的Chromebook与您的Android手机 | MOS86
  • google smart lock 的简介
  • 论文分享:Smartlocks: Lock Acquisition Scheduling for Self-Aware Synchronization
  • 【UE4】界面打开关闭异常闪退
  • 模型压缩和加速方法总结和文献综述
  • 13、计算机网络的七层模型、四层模型 以及 五层模型
  • YOLOX模型部署Android端-NCNN方法
  • Pytorch离线下载并使用torchvision.models预训练模型
  • 萤石摄像头.av视频文件如何播放?
  • 阿里云CN域名注册、续费、转入和赎回价格表
  • 阿里云注册域名创建信息模板流程及审核时间说明
  • 【设计模式】策略模式和抽象模板实现权益发放
  • 编码技巧——权益发放(策略模式+抽象模板)
  • 内网穿透原理和实现思路介绍

英语august_独家:August Smart Lock缺陷向黑客开放您的Wi-Fi网络相关推荐

  1. August Smart Lock:终于等到你,一款真正值得夸的智能家居产品

    August Smart Lock(八月智能锁)可以将普通门锁改装为智能门锁,不需要完全换掉旧门锁,原来的钥匙也仍可用.但八月智能锁能适配市面上常见的.标准锁芯的单面呆锁(single-cylinde ...

  2. 魅族手机怎么开启smart lock功能

    前言: 最近本人买了个小米手环4代,但是有个功能不是小米手机不支持(屏幕解锁-smart lock),本人手机是魅族手机,但是安全中没有smart lock这个功能,于是就查阅了各大搜索引擎的类似文章 ...

  3. 剖析Android的Smart Lock

    前言   本文的内容基于https://nelenkov.blogspot.com/2014/12/dissecting-lollipops-smart-lock.html,省略去NFC的内容.    ...

  4. Smart Lock人脸解锁用法

    参考FAQ13840 Smart Lock人脸解锁用法: 前提: Smart Lock要开启必须将屏幕锁定方式设置为"图案"."PIN"或"密码&qu ...

  5. google smart lock 的简介

    Smark lock 本文跟大家介绍一下安卓自带的一个功能-- Smart lock Smart lock 是 Andoird 5.0 新引入的智能解锁方案,它可以在信任的蓝牙/NFC 设备.地点实现 ...

  6. android smart lock,使用Smart Lock自动解锁您的Chromebook与您的Android手机 | MOS86

    The Android 5.0也有自己的 你什么在Android 5中使用Smart Lock.0并且永远不要在家里解锁你的手机 这个功能需要几件东西: 一个带有运行Chrome OS 40或更高版本 ...

  7. Android支持Smart Lock 人脸解锁

    平台 RK3288 + Android 7.1 需求 支持人脸解锁 方案说明 使用Smart Lock 中的 "可信面孔" 功能实现人脸解锁 实现步骤 内置GMS(若PUSH进去, ...

  8. 如何安装和设置Kwikset Kevo Smart Lock

    Traditional door locks work just fine, but if you want to add some smarts to the security of your ho ...

  9. smart 200密码忘记_如何阻止某些Android应用与Smart Lock同步密码

    smart 200密码忘记 Google's Smart Lock for Passwords makes it easy to sync the passwords you have saved i ...

最新文章

  1. Pacbio 数据相关的几个重要概念
  2. Symfony4中文文档: 安装和设置Symfony框架
  3. 点击切换div 的隐藏与显示
  4. C++和Rust_【Rust水群夜话】盘点Rust 官方团队2019年进展
  5. Java【快速排序、插入排序、简单选择排序...】【八大排序-综合实验】
  6. NoSQL分类及ehcache memcache redis 三大缓存的对比
  7. [poco] 访问数据库
  8. 在 NetBeans IDE 中调试 PHP 源代码
  9. 亚马逊出的平板电脑_亚马逊发布新Fire HD 8系列平板电脑,90美元起
  10. c语言,在主函数中输入一个整数,求该整数各位数字的乘积,[求助]求由键盘输入的任意两个整数的积...
  11. geotools绘制椭圆API
  12. vue 打印出git提交信息_VUE项目构建打包生成Git信息(VERSION和COMMITHASH文件)
  13. ELK详解(二十四)——geoip画访问地域热图
  14. 系统虚拟化与虚拟机的区别
  15. zipfian 参数是什么 Zipfian distribution 齐夫定律
  16. Java安全生态-Java加解密API详解-Java安全框架官方文档翻译:对称/非对称加密、数字签名、数字证书、安全通信、密钥库等
  17. 计算机仿真题液相色谱,液相色谱法
  18. Vue.use 写多个_支付宝为16个行业写的文案,据说价值30万
  19. intel和ATT汇编格式区别
  20. mpp新增一个字段_DM8 MPP环境搭建

热门文章

  1. 自学编程真的很无力吗?不,完全可以相信自己。【肝 5000+字自述java自学】
  2. FairyGUI 代码生成插件
  3. 注意力机制:基于Yolov5/Yolov7的Triplet注意力模块,即插即用,效果优于cbam、se,涨点明显
  4. 【SA8295P 源码分析】13 - Android GVM 虚拟机 QUPv3 UART / SPI / I2C功能配置及透传配置
  5. java-php-python-ssm基于企业客户管理系统计算机毕业设计
  6. Latex 快捷键总结
  7. java毕业设计期刊在线投稿系统源码+lw文档+mybatis+系统+mysql数据库+调试
  8. 如何解决matlab共享中独立桌面app选项为灰色的问题
  9. 瑞星“碎甲(Anti-Rootkits)”技术说明
  10. 架构师之修炼内功篇-系统性能优化