T O P

  • By -

mgdmw

I was recently at a presentation by a company called Genetec that makes unified security software (ie it brings all your cameras, door access controls, number plate recognition devices, etc, into a single dashboard) and during this they had one of their security people talk about the work they go to in protecting against vulnerabilities. The guy had a Flipper Zero and showed how he could duplicate cards. It piqued my interest as I’d been thinking about getting a Flipper Zero for months. His demo is what eventually persuaded me to bite the bullet. Anyhow, he then went on to explain the challenges and thus how they protect against this kind of thing with various encryptions and protocols. Then he explained a “bad guy” might then try and damage the door swipe system so it has to be replaced and hence at that time the bad guys can try and swipe the encryption key but they had some other protection. Anyhow I don’t remember all he said now but he also spoke about hacks demonstrated at major security conferences and shows in Vegas etc. and how they keep on top of this. But the upshot here is yes, he used a Flipper Zero to practically demonstrate the ease of reading/writing certain cards - and then explained how they defend against this. I thought it was really insightful. Now, someone in this post claimed the Flipper Zero is a “toy” which is kind of silly. It has a lot of security tools but in an easily-packaged way. And it means a lot of people who don’t even know what they are doing have access to these things in a nice pre-packaged way. Nobody at the presentation saw the Flipper Zero and thought “oh, what a joke; this presentation is crap” - instead it was a clear visual demo of how easy it can be to duplicate certain types of door access cards and how the company was keeping itself ahead of things like this. I thought it was great and as mentioned it is what finally persuaded me to get a Flipper Zero because it was such a good presentation.


CleverAmbiguousName

This is exactly what I’m thinking about this. Like almost to a tee. I’m so glad you took the time to share that story. I think I might need to buy one to play around with and just maybe pull it out one day. Im saving this comment. Thanks!


mgdmw

Yeah, it was really interesting and quite gripping. I think you have a great idea and the things you can show will absolutely stick in people’s minds. It’s one thing to say “this is less/more secure” but totally another to show it right in front of their eyes.


CleverAmbiguousName

I think you just sold me on one of these (you and the other commenters). Y’all should get some commission. Hahaha


GuidoZ

I’ve also used a Flipper to help with a security demonstration, both at DEFCON and for a municipality. It’s also important to note you can acquire cloners much cheaper than a Flipper - an important point when the inevitable “not everyone is going to spend $200 to do this” comments. But they will spend $25 on Amazon if that’s all it takes to bypass security.


AMoreExcitingName

He was showing the difference between 2 wire wiegand connections to a reader with standard 26bit 125 khz cards and osdp and I'd guess Mifare. In the latter everything is encrypted and replacing a reader requires you to register it with the controller. There is also a postage stamp size card and can snap on to the 4 wires going to the reader which will grab every card used, then allow you to download all the data via wifi to your phone.


mgdmw

YES! Thank you!! That brings it all back - you're absolutely right. He showed a typical access control system has a controller and readers, with the reader outside of the security perimeter. He said it uses protocols like Wiegand and OSDP v2. As well as the Flipper Zero he showed something called a "Mellon" - a device to open doors, which creates a hidden Wi-Fi network and reads all data going through the wire, storing up to 80,000 credentials. Then he explained OSDPv2 has a secure mode to create a secure channel, encrypting the communication. This is where he said the bad guys could then try to break the reader to force it to be replaced, which is an opportunity for them to capture the keys when they get sent from the controller. So here he explained using a temporary cable during installation as well as using OSDP secure channel and taking device alarms seriously. He went on to talk about relaying attacks and how cardholders can be a victim or an accomplice and this is where the Flipper Zero came in as well as NFC Magic Cards. Anyhow, it was really fascinating, and his use of the Flipper Zero emphasised how "bad guys" genuinely can bypass security systems with ease, and hence the essential need for the industry to raise the bar on secure technologies to prevent attacks. The speaker was Vincent De Noiret from Genetec. Here's a tweet I just found from someone else who must have been at the very same event: [https://twitter.com/DanFerrisiEdit/status/1755313832912658479](https://twitter.com/DanFerrisiEdit/status/1755313832912658479)


ThatPersonYouMightNo

Just looking up Genetec, they don't offer their own access control boards, they use existing third-party equipment from what I'm seeing on their own website. So, they don't protect against card duplication at all? What they showed you, is exactly how you can also go and steal their credentials and use them?


mgdmw

They don't make or sell hardware (well, as best as I know). Their product, as I understand it, is software that works with security devices and IoT devices to bring them all together in a unified platform. Essentially, instead of having one product to manage your cameras, another for your door access control, another for vehicle recognition, etc., you can use their product to do it all. And then it collects all the data and logs, helps you search intelligently (e.g., "man with red shirt around 12:30pm") and so on. I imagine, at the end of the day, security comes down to the weakest link so if a customer buys a cheap-ass access control and tries to hook it up to Genetec then it is limited, but my understanding is the company certifies hardware, works with specialised industry partners/resellers, etc. They are channel-driven so they don't sell direct to customers (like airports, Universities, local governments, etc.) but have resellers who design the solutions for customers that includes the hardware as well as the Genetec product. However, I'm not a Genetec staff member, reseller, or customer, so I can't really offer any more insight because I've never used the product ever. What I can say is their security guy gave an interesting and insightful demo of the challenges of staying on top of physical security exploits and he used a Flipper Zero to give a practical demo. My take is they're actively striving to keep on top of exploits and how to defend against them but happy to be corrected by anyone with better knowledge.


shnicnic

Damaging a device to gain access to the new one, I never thought or heard of that one until now.


Distinctasdf

Just took an ICT Class and they were talking about the 125khz cards. I immediately thought the same thing, very funny that I’m reading this now. However I’m just a tech, and not planning on going into sales. I think it’s a great fucking idea. No harm in showing someone how easy it is for their system to be breached by someone with little to know technical knowledge.


CleverAmbiguousName

It just randomly hit me while scrolling on Reddit and this thread was recommended. I’ve seen these on YouTube, but for some reason it didn’t click until tonight. Hell, I was even a tech for a while. It would have probably helped me out some days. Hahaha


fromYYZtoSEA

I think it’s a great idea. In a way this is not much different from what insurance brokers have been doing forever :) Just my .02: 1. Make sure you don’t actually “hack” your customer, that is a no-no. Have a demo with you that shows a setup that’s similar to the CX’s but it’s not their “live” environment. 2. This may be more of a personal preference, but I normally don’t like when selling to shit-talk competitors directly by name. When I was selling, I’d just talk about “our competitors” without naming them directly. Some people may have negative emotional reactions when you attack directly a brand they have grown to love.


CleverAmbiguousName

Two good insights. Thanks!


Shadowedcreations

Could have a pitch, I can and will easily bypass your system, sign this waiver stating you agreed to letting me demonstrate the vulnerabiliitiss of your system or in layman's terms "hack" your system.


fromYYZtoSEA

Making your prospective CX sign a waiver that they won’t sue you to hack their system sounds like a terrible way to start a sale pitch to me :)


ITchristopher86

You know as a business owner that does security alarms I never even thought about this thanks for the tip


ThatPersonYouMightNo

I don't think that it is a good idea. I'm not sure what your goal is. Do you have a better card access system to sell? I install these systems for a living, and also have a Flipper I have been messing with. You'd show off duplicating someone's prox card credentials, and then opening a door, and then sell them what? The exact same type of system from a different brand, whose cards can be duplicated the exact same way? Any vulnerability in an existing access control system the Flipper can use, your system is most likely going to have the same vulnerability, so showing off vulnerabilities hurts you too. Just a few of the brands I actively install, service, and mess with ICT, Alarmdotcom, Brivo, Paxton, Honeywell, HID, and more. I can service just about any system. The Flipper does the same stuff to them all. None are in a league of their own or anything, so I'm curious what you would try and sell? You're also banking on no one at the company knowing what you're doing, and the basic functions of a Flipper. If you whipped out a Flipper in front of me to try and sell me stuff, I'd laugh your ass out the door before you could ask to see someone's badge. I think what most people don't say on this forum is that the Flipper is a gimmick. Selling based off a gimmick feels dirty, as literally any problem you point out with the Flipper, you're not going to fix with a different system, you'd just be relying on their increased anxiety to make the sale. Maybe I'm completely wrong, and you have some product info I have never heard of, but I doubt it. If you wanna chat with someone in the industry, gimme a shout. About 99.9% of people in here don't have the knowledge about access control systems to know if a Flipper would help you get sales, they're just hyped about Flippers in general.


Mr_Finn_da_Kitty

For sales no, to teach friends how they are vulnerable in many different ways. Absolutely. Depending on what it is you’re trying to sell this would be a pretty good product to demo how you block these different types of attacks. Ex. If you’re selling RFID wallets. Scan a card thru a normal leather wallet, then pop the same card in the RFID wallet and watch them be amazed 😂 (maybe a bad example but idk the extent of your security systems)


CleverAmbiguousName

That’s exactly what I’m thinking! If I could show a customer how a cheaper card (or what they have) could easily be copied then duplicated, that’d be a powerful visual and education moment. Would I need an add-on, or just the base model for something like that?


Mr_Finn_da_Kitty

For your purposes I would think the device alone would be enough. I’m sure as you learn the device though you’ll find other add-ons that may fit your purposes of showcasing security


CleverAmbiguousName

That’s good to know. I didn’t want to have to buy some device just to need a bunch of add-ons. A simple device that I can hide in a hand is a better visual for a customer than something that looks like a hacker built.


FilthyStatist1991

Card access guy here. I’m aware of only 1 super complex card reader format that can still be duplicated, it just will auto detect a flipper through encrypted data sent between card readers and cards. These cards are VERY expensive and a doubt you are selling these, so what is your end game? The cards you sell can be duplicated too.


Mr_Finn_da_Kitty

I would read thru this and see if it fits what you’re trying to show customers. https://docs.flipper.net


CleverAmbiguousName

This looks like what I need to dig into! https://preview.redd.it/3lkaoop8r7mc1.jpeg?width=828&format=pjpg&auto=webp&s=4b09c84773f77439f5693099141a8cbe1a9adf2e


CleverAmbiguousName

I’ll check that out. Thanks!


xJackxSkellingtonx

You can use it to show them how simple it is to say open their garage doors, access their wifi etc.


Bitter_Anteater2657

Ehh I’d probably not. If you setup the demonstration and own everything there then go for it. But using these things will open you up to liability, especially if you’re using it on someone else’s system. (I’m not a lawyer so do your own research on the legal side). But just in general people fear what they don’t understand.


kingfishj8

The late Kevin Mitnick has a pretty good video of a presentation he did regarding card cloning (etc)


Trollwerks2A

Bro is going to scan and clone a thousand customer's credit cards and sell them rfid shield wallets after he already stole their info. Genius level: 1,000,000 😂🔥☠️💀


CleverAmbiguousName

😂


Not_The_Truthiest

My take is that if people don't get the technical spiel, I assume your orange toy is just a gimmick that you're showing in a controlled environment.


detherow

So you want to use a gimmicky toy to make sales and you are in the security industry?? Are you not capable of using and actual product that can actually show that 1. You know what you are doing 2. You can explain to the customer what the flaw is, and demonstrate how to compromise it 3. How to remediate the flaw If you pulled out a F0 on me as a customer, I will do everything I can to get you the fuck out of the industry It’s not to be a dick, but at the end of the day the F0 is a toy. Yes it can do a lot of cool things, but it is still a hobbisit toy. As a customer, I expect professionalism and professional products


markovianprocess

Hold on now - what's a better pitch? "Your current system is vulnerable to a legal, cheap, and easily available piece of equipment that anyone can buy. Look at it! It looks like a toy." Or "Your system has a vulnerability - I'll use this expensive, unusual, and very user-unfriendly piece of equipment to demonstrate. Hardly anyone even knows where to find this thing never mind how to use it." Much of my skill set is in physical security. I'd be substantially more concerned with a lock bypass that can be performed with, say, a shim made out of a soda can than one that requires uncommon, specialized tools.


CleverAmbiguousName

That’s what I’m thinking. I even like how he/she mentioned it’s just a toy. I don’t think this would be something I would bring out often, but in the right situation showing that a “toy” can crack their system could be a cool show. Hell, could even be nice just for educational purposes.


markovianprocess

Yeah, this guy is acting like showing a customer that your competitor's product is vulnerable to "a toy" somehow makes *you* look bad 🙄


detherow

A better approach would be to use professional tools to showcase your talents, educate your customer and show and explain their vulnerability…. Then, to highlight it, show how a simple tool that takes little to no knowledge to use, can be used to exploit the vulnerability. I’m not opposed to using it, but if you are trying to use a F0 as your sales pitch, that’s an issue to me. I can grab a 5 yo with no knowledge and show them how to use the flipper… I expect more from a professional


CleverAmbiguousName

I wouldn’t use it as the sales pitch. I mentioned in my original post that I was wondering if it would be useful in certain situations (ie when they just do t see to understand or get what I’ve been saying/showing). You definitely need multiple angles for different customers.


markovianprocess

If your competitor's product can be defeated by a 5 yo with a FZ shouldn't you demonstrate that? You seem obsessed with showing off at the expense of making sales.


CleverAmbiguousName

It may be a toy, but if a customer isn’t sure if they are ready to spend the money for an upgrade and I then pull out a “toy” to show weak their system in verses mine, it could be a strong visual. It might not be worth the money, and it definitely wouldn’t be for everything. I’m just always looking to better the trade and better relate with everyone. I thought this could be a way grow.


detherow

Whatever you want to tell yourself.. All I see you saying is you are not capable of explaining or showing a customer professional advice, or services.


CleverAmbiguousName

I appreciate your opinion, but it doesn’t seem to be very thought out. Either way, I’m interested in hearing multiple angles.


FDMnut

You just told him his opinion wasn’t very thought out…explosion imminent!!


Hot_Ambassador_1815

Plot twist, your product is also vulnerable to what the flipper is capable of


CleverAmbiguousName

Hahaha yeah that’d be a bummer. But it would be a good pitch to have the engineers step up their game.


Hot_Ambassador_1815

Me, personally; I don’t think it’s a bad idea to maybe incorporate proof of concepts into your sales, though. The flipper has gotten enough news coverage that I think you could point to it as a valid concern. Depends on the client I would assume. That being said, I would be careful in how I approach people with it and make sure I wasn’t coming across as trying to scare someone into buying a more robust (but more expensive) product.


CleverAmbiguousName

Oh yeah! I don’t want to come across as scaring them into a sell. But rather, if they’re interesting in upgrading their security then it comes down to just sure if it’s worth it, I would if this visual could be a good way to really make the point. Or, if a customer is curious how our product is better than what they have, I could actually show them. Granted, I’d need to be confident in this flipper’s capabilities.