Zigbee Attack Essay

Decent Essays
packets. This will drain the battery of the Zigbee module and can be used to disable the device [9].
The second and most overlooked attack is a physical attack on the actual Zigbee device. Zigbee devices are not very secure. They often store the network key information in plain text without encryption or password protection. Simple AT commands can often be used to retrieve this information if the device is physically accessible. All Zigbee devices in the network have access to the encryption keys so that packets can be encoded and decoded. As a result, an attacker only needs to find the weak link in the network and exploit it to gain access to the key information. Zigbee devices are often spread out and in remote locations. This creates an easy target
…show more content…
ATTACK IMPLEMENTATION
This Section describes my attempts to attack a Zigbee network. For these tests I did not have access to a pure Zigbee device, so instead I used the XBee radio. Xbee’s use the same underlying 802.15.4 protocol but instead of the Zigbee protocol layers, they use their own networking and application layer protocols. The Xbee and Zigbee protocols are very similar. In addition to the Xbee devices, I also used the Texas Instruments CC2531 as an 802.15.4 packet sniffer.
The first attack that I tried to implement was a packet sniffing attack using the CC2531. This chipset is able to receive and decode 802.15.4 packets and pass them on to the computer’s network card so that they can be displayed in programs such as Wireshark. However, I ran into issues installing the device drivers for the sniffer. The sniffer only has drivers for Windows but I have an Apple computer. If the sniffer worked, I would be able to receive the raw 802.15.4 packets and pipe the data into the Zigbee decoder that was developed with the KillerBee framework. This software is able to extract the network key from the packet data [8]. Once the network key is pulled from the packet data it can be used gain access to the Zigbee

Related Documents

  • Decent Essays

    Summary Of Blue Pill

    • 826 Words
    • 4 Pages

    She wanted to prove that she could create a collection of computer software that would remain undetectable (Vaas, 2007). How did it work? It manipulated registers, input/output, and registers, among other processes, for virtual operations at the hardware level (Beaver, 2016). It exploited the fact that the virtualization technology was vulnerable, and entered the system through administrative access. When users installed a new version of Windows, they usually installed many programs and services of which they were not aware (South University Online, 2016).…

    • 826 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    The Docker Chapter Summary

    • 1565 Words
    • 7 Pages

    After opening the package, a wizard for installation of the Boot2Docker on Mac OS X will be displayed. This is shown below: 4. Click on the button written “Continue” so that you can proceed with the installation process. You will notice some warnings from the system about installation of this software. Just ignore these and proceed with the installation.…

    • 1565 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    This may be an indication of malware blocking the application from initiating. The server was unable to identify the Test utilities executable files. In addition, the USB and CDs that had the various test on them were tested and were intact. The second problem that was notice was the state of the remote connection from the server. A scan reported open ports that were undetected from within the operating system.…

    • 1086 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Advantage Of NAT

    • 1778 Words
    • 7 Pages

    This is done by configuration of routers to make sure that they drop or ignore these private IP addresses from the public internet. By doing this an organization can re-use any of the private IPv4 addresses unlike public addresses. NAT only allows for one single…

    • 1778 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Another way to prevent identity theft is by making sure the web page you’re purchasing an item from or putting your personal information on has a little lock symbol in the web search bar. This lets you know you’re on a secure and legit page that will protect all your information. Also do not make purchases from websites that advertise the ‘too good to be true’ specials. These websites are usually scams that make you enter your information and then say something like ‘sorry, this webpage is unavailable’ or something to that effect. Never make purchases from a site that you’ve never been on.…

    • 1031 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Teslacrypt Analysis

    • 1012 Words
    • 5 Pages

    Teslacrypt (a.k.a. EccKrypt ) is a malicious program that encrypts users ' files without the knowledge or consent of the user. It falls into the sub-category of ransomware, a type of malware that encrypts the user 's files using AES encryption and forces them to pay a certain amount of money to decrypt the user 's information, essentially holding a person 's data as hostage. It first emerged around February 2015 along with its counterpart, Alphacrypt, which was released in April 2015, and it has proven capable of infecting most versions of Windows including Windows XP, Windows Vista, Windows 7 and Windows 8. It can infect multiple types of files, but among the most infected are video game files, including, but not limited…

    • 1012 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Xbox 360 Research Paper

    • 1072 Words
    • 5 Pages

    Fortunately, the 10.7 firmware can patch all the exploitable access through an SD card. This include the Team Twiizer’s release of the DSi-mode exploit called Sudokuhax that loads homebrew from the SD card in DSi-mode using a purchased Sudoku app. The new firmware checks all the program and similar to the PS4 firmware. Once it finds an unrecognized program, it reports that program and in some cases, if it recognized the program as an exploiter. It will ban the consoles from online gaming for a certain amount of time or permanently depending on the type console used.…

    • 1072 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    This site defines cookies and some of the ways they are used. The site states, "a ‘cookie’ is a small text file placed on your local computer sent by a web server so that your data can later be read back from that website." This file will tell the Internet information specific to the user’s computer, and if the user ever visits that site again. The video, on the referenced site, goes on to explain in more detail the different areas where a cookie can be used. Some of the things that can be done by a cookie are targeted marketing, saving user credentials and even giving out basic networking…

    • 1113 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    This is not the only cause as a challenge may be encountered as per the USB cable used thus causing the error message. In some common and ordinarily used terms this error message refers to jailbreak or a bricked device. This means what your device is in no capacity to function and is somewhat dead. Below are detailed steps on how to recover and get rid of this error message in regard to the cause of the message. Note: Most of these errors happen because one’s computer has older versions of the software or can’t connect to the server.…

    • 1071 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Computer Virus Essay

    • 1548 Words
    • 7 Pages

    Accessing your PC or computer without a monitor sounds like an impossible mission to accomplish. Fundamentally, that might probably be true. On the other hand, with so many advanced applications and programs nowadays, the impossible is now achievable. With the help of a remote or virtual network computing application, you may access a computer with no aid of a monitor. Such an application allows one to make use of a computer that has a monitor to use and access another computer linked to the same network or via the…

    • 1548 Words
    • 7 Pages
    Decent Essays