{"id":227,"date":"2009-05-11T13:20:23","date_gmt":"2009-05-11T17:20:23","guid":{"rendered":"http:\/\/www.willhackforsushi.com\/?p=227"},"modified":"2009-05-13T16:38:55","modified_gmt":"2009-05-13T20:38:55","slug":"locating-zigbee-devices","status":"publish","type":"post","link":"https:\/\/www.willhackforsushi.com\/?p=227","title":{"rendered":"Locating ZigBee Devices"},"content":{"rendered":"<div id=\"attachment_234\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.willhackforsushi.com\/wp-content\/uploads\/2009\/05\/zbfind.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-234\" class=\"size-medium wp-image-234\" title=\"zbfind screenshot\" src=\"http:\/\/www.willhackforsushi.com\/wp-content\/uploads\/2009\/05\/zbfind-300x180.png\" alt=\"ZigBee Device Finder\" width=\"300\" height=\"180\" srcset=\"https:\/\/www.willhackforsushi.com\/wp-content\/uploads\/2009\/05\/zbfind-300x180.png 300w, https:\/\/www.willhackforsushi.com\/wp-content\/uploads\/2009\/05\/zbfind.png 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-234\" class=\"wp-caption-text\">ZigBee Device Finder<\/p><\/div>\n<p>Since the introduction of the ZigBee-2004 specification, the <a href=\"http:\/\/www.zigbee.org\" target=\"_blank\">ZigBee Alliance<\/a> has made significant improvements in the security of sensor-based wireless networks.  Despite improvements introduced in later amendments including the ZigBee-Pro specification, the security is not bullet-proof, due to the significant constraints of CPU, flash and memory availability in low-cost devices.  Designing around these constraints, the ZigBee Alliance has made reasonable security options available to vendors of ZigBee products, broadly classifying security levels into high-security mode (intended for enterprise applications) and low-security mode (intended for residential applications).  Looking at the available offerings for ZigBee stacks from vendors such as Atmel, Microchip and TI, it is apparent that high-security mode costs more, not necessarily in software costs but in terms of memory, flash and CPU requirements.<\/p>\n<p>If you read up on ZigBee, you&#8217;ll quickly identify the Achilles&#8217; heel plaguing the security of any low-cost wireless technology:<\/p>\n<table border=\"1\" width=\"80%\" align=\"center\" bgcolor=\"lightgrey\">\n<tbody>\n<tr>\n<td>&#8220;&#8230; due to the low-cost nature of ad hoc network devices, one cannot generally assume the availability of tamper resistant hardware. Hence, physical access to a device may yield access to secret keying material and other privileged information, as well as access to the security software and hardware.&#8221;<br \/>\nZigBee Specification 053474r17, Jan. 2008; available from <a href=\"http:\/\/www.zigbee.org\" target=\"_blank\">www.zigbee.org<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div style=\"width: 260px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.flickr.com\/photos\/travisgoodspeed\/3351124394\/\"><img loading=\"lazy\" decoding=\"async\" title=\"ZigBee CC2420\" src=\"http:\/\/farm4.static.flickr.com\/3649\/3351124394_7c2a2a9685.jpg\" alt=\"ZigBee CC2420\" width=\"250\" height=\"187\" \/><\/a><p class=\"wp-caption-text\">ZigBee CC2420<\/p><\/div>\n<p>Effectively, if you use sensor-based networks, and an adversary is able to steal a device, they can extract key information from the hardware which can be used to exploit the rest of the network.  This style of attack has been demonstrated by my neighborly colleague <a href=\"http:\/\/travisgoodspeed.blogspot.com\/2009\/03\/breaking-802154-aes128-by-syringe.html\" target=\"_blank\">Travis Goodspeed<\/a> on multiple occasions, snagging encryption keys, dumping device firmware and many other interesting hacks with hardware in hand.<\/p>\n<p>Following Travis&#8217; article, a few people submitted posts indicating that while his attack is interesting, it requires hardware to be effective.  Today, we&#8217;re a little bit closer to making that reality.<br \/>\n<span style=\"color: #ffffff;\">.<\/span><\/p>\n<h2>Introducing zbfind &#8211; ZigBee Location Tracking<\/h2>\n<p>Following my previous work on <a href=\"http:\/\/www.willhackforsushi.com\/?p=198\">reversing the Microchip Zena ZigBee sniffer<\/a>, I put together a quick Linux tool to passively sniff for the presence of ZigBee\/802.15.4 devices and display some summary information about the identified devices.  When a device is selected in the GTK UI, a speedometer needle and histogram will record the relative signal strength of the selected device with a relative distance estimate in feet using the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Free-space_path_loss\" target=\"_blank\">free-space path loss formula<\/a>.  A <a href=\"http:\/\/www.willhackforsushi.com\/wp-content\/uploads\/2009\/05\/zbfind.png\">screen-shot<\/a> is displayed at the top of this post.<\/p>\n<p>Readers from my <a href=\"http:\/\/www.sans.org\/training\/description.php?mid=3\" target=\"_blank\">SANS Ethical Hacking Wireless course<\/a> will recognize this UI; it&#8217;s based on a tool <a href=\"http:\/\/www.kismetwireless.net\" target=\"_blank\">Mike Kershaw<\/a> and I wrote for Bluetooth analysis (that has yet to be released, but we have big plans for it, stay tuned).  This initial code is a little rough around the edges, but provides a simple interface to track down and identify ZigBee and other 802.15.4 devices in the area.<\/p>\n<p>I&#8217;m holding off on releasing this tool until I iron out a few more bugs, but am happy to share the code individually if folks 1. have a <a href=\"http:\/\/www.microchip.com\/stellent\/idcplg?IdcService=SS_GET_PAGE&#038;nodeId=1406&#038;dDocName=en520682\" target=\"_blank\">Microchip Zena Sniffer<\/a> and 2. have experience with Linux and Python.  <a href=\"http:\/\/www.willhackforsushi.com\/?page_id=87\">Drop me a note<\/a> if you are interested and meet these conditions (I don&#8217;t mean to be unfair, but I want to spend my time working on the code to add features and fix bugs instead of helping users, at the moment; thanks for understanding).<\/p>\n<h2>My Goals<\/h2>\n<p>My goal in releasing this tool is simple: provide administrators with the firepower to justify the added cost of enterprise-security ZigBee technology with hardware tamper-proof security features.  If the tools don&#8217;t exist publicly, many people disregard the threat.  By making this tool available, I&#8217;m hoping people will be able to use it as an argument to justify more expensive ZigBee hardware deployments where warranted by security policy.<\/p>\n<p>-Josh<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the introduction of the ZigBee-2004 specification, the ZigBee Alliance has made significant improvements in the security of sensor-based wireless networks. Despite improvements introduced in later amendments including the ZigBee-Pro specification, the security is not bullet-proof, due to the significant &hellip; <a href=\"https:\/\/www.willhackforsushi.com\/?p=227\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,7,6],"tags":[],"class_list":["post-227","post","type-post","status-publish","format-standard","hentry","category-linux","category-security","category-zigbee"],"_links":{"self":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts\/227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=227"}],"version-history":[{"count":20,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts\/227\/revisions"}],"predecessor-version":[{"id":261,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts\/227\/revisions\/261"}],"wp:attachment":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}