Practical Alarm System Bypass for Security Professionals
Over the past several decades most alarm installations have stayed the same more than they have changed. Advancements in physical intrusion detection technologies have produced promising results, but adoption has been generally restricted to government and high-security installations. As a result, most alarm systems installed today remain vulnerable to a variety of attacks and weaknesses. While some research has been performed regarding these systems, the operational information about them is scarce and sometimes incorrect. As a result, the modern security professional has had few resources available for adequately auditing many alarm installations.
From server racks to commercial installations, many alarm systems in use today remain highly vulnerable to malicious tampering and bypass.
Designed for security professionals with no alarm experience, this training will review past and present alarm system architecture, it’s design elements, associated sensors, and methods for their defeat. Both wired and wireless technologies will be discussed, and students will receive extensive hands-on experience with alarm hardware, sensors, and defeat tools.
Students completing the course will have a more comprehensive understanding of how alarms are designed to be used, how they are defeated, and methods that may be used to enhance attack-resistance.
- Alarm History: Past and Present
- Modern Alarm Systems
- Alarm Hardware Overview
- System Design and Architecture
- Wired Bus Protocol Overview
- Bus Accessories and Hardware Overview
- Hardwired Alarm Zone Overview
- Wireless Zone Overview
- Wi-Fi and Cellular Bridges
- Common Sensor Types
- Common Sensor Placement: Good, Bad, and Ugly
- Architectural Weaknesses in Alarm Systems
- Design and Installation Problems
- Weaknesses and Bypass Methods for Hardwired Zones
- Weaknesses and Bypass Methods for Wireless Zones
- Sensor Jamming and Spoofing
- Proper Installation Guidelines
- Wireless Zone Risk Reduction Methods
- Understanding System Weaknesses
- Preventing Physical Access to Critical Alarm Infrastructure
- No prior alarm or hardware experience is necessary
- Students should bring a laptop or notebook computer capable of running a VMware image with the necessary tools
Babak Javadi Security Researcher, Red Team Alliance / The CORE Group
Babak Javadi is a hardware hacker with a wayward spirit. His first foray into the world of physical security was in the third grade, where he received detention for describing to another student in words alone how to disassemble the doorknob on the classroom door. After years of immersion in electronics and hardware hacking, he found his passion in the puzzling and mysterious world of high security locks, safes, and alarm systems. After serving as a driving force within the locksport community for almost a decade and co-founding the US division of The Open Organisation of Lockpickers, he has recently re-embraced the beauty of the baud and resumed hardware hacking with a vengeance. He currently serves as the President of the US group of The Open Organisation of Lockpickers (TOOOL) and is the founder of The CORE Group, a security research and consulting firm. When not hunched over a lab workbench or crouched beside an auxiliary entrance to a target building, Babak travels around the world to speak at varied conferences, agencies, and companies, including DEF CON, HOPE, BlackHat, Confidence, HITB, DeepSec, eko, and the USNA. He enjoys spicy food and lead-free small arms ammunition.
Drew Porter , Red Team Alliance / Red Mesa