PIN-Cracking Robot To Be Showed Off At Defcon 114
Sparrowvsrevolution writes "At the Def Con hacker conference in Las Vegas early next month, security researchers Justin Engler and Paul Vines plan to show off the R2B2, or Robotic Reconfigurable Button Basher, a piece of hardware they built for around $200 that can automatically punch PIN numbers at a rate of about one four-digit guess per second, fast enough to crack a typical Android phone's lock screen in 20 hours or less. Engler and Vines built their bot, shown briefly in a preview video, from three $10 servomotors, a plastic stylus, an open-source Arduino microcontroller, a collection of plastic parts 3D-printed on their local hackerspace's Makerbot 3D printer, and a five dollar webcam that watches the phone's screen to detect if it's successfully guessed the password. The device can be controlled via USB, connecting to a Mac or Windows PC that runs a simple code-cracking program. The researchers plan to release both the free software and the blueprints for their 3D-printable parts at the time of their Def Con talk."
lock out? (Score:1)
Re: (Score:1)
The fuck? It's that easy to cause hassle?
Yes, I know a destructive colleague could just smash the 'phone, but there's a psychological barrier between causing mischief by swiping your hand across a screen, and being a physical vandal.
Re: (Score:2)
With newer phones being synced to the cloud, wiping my phone is less of an issue today than it was a few years ago......
Re: (Score:1)
And that since it is a blackberry, which I would think would be connected to a BES, it is only wiping corporate "cloud" stored information. BTW, this feature is why BB has been so strong for the enterprise.
Re:lock out? (Score:5, Informative)
"But every Android phone that Engler and Vines tested was set by default to use a much less stringent safeguard, delaying the user just 30 seconds after every five guesses. At that rate, the robot can still guess five PINs every 35 seconds, or all 10,000 possibilities in 19 hours and 24 minutes."
Not by default.
Re:lock out? (Score:4, Funny)
Re: (Score:2)
Re:lock out? (Score:5, Funny)
Or, just don't hand your phone to people carrying silly looking robot parts that want to borrow your device for "19 hours".
Problem solved!
Re: (Score:1)
Re: (Score:2)
http://xkcd.com/936/ [xkcd.com]
Re: (Score:2)
Re: (Score:2)
Or just use a longer PIN than 4 digits. Even a 5 digit pin would extend 20 hours to about a week.
Re: (Score:3)
Why have they made the assumption that a PIN is 4 digits? Mine is 8, and you can set a password instead if you wish.
Re: (Score:2)
Oh big deal, it will only take twice as long then! I'm certain if they are willing to wait 20 hours, they are willing to wait 30.
P.S.
Please note that the above post is intended as humor and should not be taken as a serious representation of mathematical reasoning.
Re: (Score:2)
And why not use the pattern-lock feature instead? Much more natural than typing in a PIN, and still very secure.
Re: (Score:2)
And why not use the pattern-lock feature instead? Much more natural than typing in a PIN, and still very secure.
Don't forget to wipe your finger grease off the screen every time. In my case it's only enabled because Android insisted on it when I added a VPN, and the marks come in handy if I go out in sunlight without remembering to turn up the brightness.
Re: (Score:2)
True, but even even with a visible finger grease smear, my sister couldn't actually figure out the unlock pattern on my tablet. I'm not sure if you can re-use nodes, but if you can then it would help to make things even more confusing
Re: (Score:1)
You can't re-use nodes, but you _can_ put in crossing lines, which makes the grease smears less useful.
Re: (Score:2)
Re: (Score:2)
This just follows with the obvious: Once somebody has physical access to your device, it will be compromised sooner or later.
If you're really paranoid, you can set an Android phone (at least if it's rooted) to wipe the phone after some number of failed unlock attempts using a program such as DelayedLock.
Re: (Score:2)
"But every Android phone that Engler and Vines tested was set by default to use a much less stringent safeguard, delaying the user just 30 seconds after every five guesses. At that rate, the robot can still guess five PINs every 35 seconds, or all 10,000 possibilities in 19 hours and 24 minutes."
Not by default.
===
Why release such a product? Are they on an ego trip to help the street gangs that break into cars or attack people for their cellphones?
If they go beyond describing it, I would call them accomplices to crime the next time a criminal (builds and) uses one of their robots for a stolen cellphone.
Re: (Score:1)
It's 270 Days to Brute Force (Score:2)
There's 389112 possible combinations. Most phones lock for 5 minutes after 3-5 tries. That's about 270 days minimum to fully brute the unlock.
Re: (Score:1)
Re: (Score:2)
There's 389112 possible combinations.
Of what?
Re: (Score:2)
It can wipe 360 of them per hour!
Re: (Score:2)
I know, you would hope that at least the headline would be correct. "Showed" is past tense, it should be "shown".
Double the delay every failed attempt (Score:5, Interesting)
Re: (Score:1)
I think 3-5 attempts before lock out is acceptable.
Allowing ~100 provides more guesses to a would be attacker who could well be someone who is aware or able to guess various pins you use/have used or the method you use to generate such pins i.e. it may be someone who knows the birthdays of your entire family and that you use birthdays as pins.
3-5 would still present a challange of which of their educated guesses to try first.
Further, in my experience, if I've tripped a lock out it's usually because I've for
Re: (Score:3)
The problem is that you can set someone up for a DoS with this approach. Want to lock a coworker out from his account and cause him to miss a deadline? Just log on as him three times, with a false password of course, and you delay him by whatever amount of time it takes IT to reset his password. Depending on their speed and skill, this may be some time, not to mention that if you do it repeatedly it might just give that coworker other problems when IT starts to complain about him and his inability to rememb
Re: (Score:2)
Then IT will examine the logs and discover the source of the lockout. Lockouts are clearable on most systems without resetting the password and after the 2nd or 3rd time it happens, IT will get interested.
Re: (Score:2)
In today's open space cubicle driven offices it's usually trivial to use a computer of a coworker who's currently at lunch. And aside of VPN (which sadly 'til today is usually only secured by user/pass and less by IP or even device) there are quite a few other options that can make it trivial to hide your actual source.
Seriously, nothing's easier than mobbing a coworker by DoS. I've had to deal with it a few times so far (yes, such a problem is part of a CISOs job and yes, my solution was simply to NOT lock
Re: (Score:1)
Tornados would be considerably less problematic if meteorologists could report God to HR for harassment when someone's house gets blown away.
Re: (Score:2)
I had a similar problem with a bank account with the Royal Bank of Scotland. They lock you out of your bank account after 3 failed attempts to enter the correct password for a given customer number. Unfortunately because this number was similar to one for another account I kept mistaking the last few digits when typing it in. A few tries using my correct password and it'd lock up and tell me to phone customer services (up to a 15 minute phone call) to find out my account wasn't locked at all. I asked but (u
Re: (Score:2)
Re: (Score:2)
The top three are:
111
123
456
Even three attempts already gets you 50% of all PIN codes.
Re: (Score:2)
Re: (Score:3)
So, if I watch you unlock your phone once, I can usually narrow each choice down to 4 digits based in the position of your finger (256 choices without knowing any).....if I can glimpse even one of your digits without knowing position, I can get that number down to 192. If I can identify that digit as early or late or middle, that drops to 128. If I have 100 tries, I don't really need to worry about being locked out.
If I have all but two of your digits, I don't have to worry about lockout at all.
Re: (Score:2)
2^n seconds would be better, where n is the number of attempts done.
Re: (Score:2)
Oh wait, that's what you said... sorry.
Gentlemen... (Score:3)
Your Friends,
The NSA
Re: (Score:1)
I think it's a mistake to have these events hosted in the US. First, they can arrest a guy at the drop of a hat, and then they can use the Invention Secrecy Act [wikipedia.org] to block further disclosure. Let's try not to forget our friend Dimitry..
How is this news (Score:3, Funny)
When I don't even see the word - cloud - in the story?
Cloud it up man! Send those pins to the cloud!
Re: (Score:2)
Hey, it has 3D printing, it has Arduino, it has Android, that trumps that petty "cloud" in buzzword compatibility by some leaps and bounds on /.
Get with the times, man.
Re: (Score:2)
Yeah, sometimes it does seem like the writers who used to work on the Smurfs are now writing "tech" stories...
Papa Cloud: "Why don't you cloud on down to the store and pick up some cloud-berries?"
Brainy Cloud: "I will, right after I finish clouding up the cloud-mobile!"
Cloudette: "We'll use them to cloud up the best cloud-cakes ever!"
a bit silly (Score:3)
Re: (Score:2)
You know what? All that lock picking they practice is also stupid, you can force your way in with a crowbar a lot faster.
Or the ATM jackpot hack, whats the point when a gun and a bank gets the same result faster...
Re: (Score:2)
Not sure how a crowbar would help you gain access to a smartphone's contents.
Re: (Score:2)
Other than you missing the point by a mile or so, a crowbar can be used to beat the person to handing over the code.
Re: (Score:1)
Like calling up the owner on their home/work phone and telling them you (the cell carrier) noticed that their phone was stolen. Then ask them for their pin so you can "find the location".
Done.
Re: (Score:2)
The thing with such devices is what is the return on investment. Is there anything of value on a typical phone that would justify the average 10 hours to break in, other to just say you did it? Well yes if you want to check on the text message of a lover who you think has other partners maybe, but it seems that u
monkey method (Score:1)
For sure. Speaking in terms of a 'brute force' crack, i'd use the monkey method...
Assuming you could get past being 'locked out' after x incorrect attempts, i'd get 4-5 friends together and have one sit out and enter passwords while the rest play hold 'em or Goldeneye or w/e. You could rotate every 4 hours or whathaveyou
I know my solutions doesn't 'scale' but I don't think this robot scales any better, comparatively. That'
Update in the next android (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
An impatient prankster can toss your phone into the loo and make your phone unusable for a good while longer.
Re: (Score:2)
Joke's On Them (Score:5, Funny)
My PIN is 9999, it'll be the last number it could possibly try!
And I'm sure in the 20 hours it takes to get that far, someone will notice and say "hey, Bob, why is there an android trying to break into your Android phone?"
Re: (Score:3)
My PIN is 9999, it'll be the last number it could possibly try!
This alludes to a somewhat valid sidebar. A more intelligent algorithm would crack most passwords much more efficiently than a sequential brute force. E.g. prioritize
- digits in forward or reverse sequence
- repeated digits or repeated pairs
- digits that can represent dates
In fact, a quick google search (!) reveals that there are quite a few shortcuts they could build into the scheme before resorting to pure brute. There's no sense giving up on efficiency just because the speed is alr
Re: (Score:1)
I would assume some simple optimizations would be added to the robot. Like, first try 0000, 1111, 1234, 0123, 9999, 6969, etc... Try all repeating and sequential digits first. Then try all possible dates in format MMDD and then DDMM. Then do the rest.
Ha! That's nothing! (Score:5, Funny)
show, showed, shown (Score:1)
to be shown
I just use adb and a USB cable (Score:1)
Every developer has USB debugging enabled and 'phone rooted, after all.
Re: (Score:1)
Recent Jellybean versions require adb authentication. You have to accept adb client's private key from the phone and the phone has to be unlocked before you can do so.
Re: (Score:2)
ATMs I've used recently only take the card long enough to scan it and return it immediately.
R2B2 (Score:2)
Re: (Score:2)
What a clever name /s. And what a great idea: Create a robot that can perform brute-force attacks on smart phone PINs. I wonder why someone would want to build that? At $200, I'm sure they'll be making a small fortune hawking it to every sleazy phone thief.
You could outsource this to India or China, have your employees follow exactly the same approach and save money - cheap human laborers can take care of all the intermediate steps the robots can't, and can do the robot's task as well. Seems like the robot is superfluous.
Time lock (Score:2)
Just program in a lock with a progressive time interval for each failed attempt. Each failed attempt causes you to have to wait longer to try again. If you limited failed attempts to say, 50 consecutive failed attempts per day, then you could easily stretech out the time to brute force crack the key to months.
Re: (Score:2)
First delay is 5 seconds, double the delay every time. We all know that story [wikipedia.org].
Bad design (Score:2)
Three servomotors? They built the thing like it was a delta 3D printer. They should have used 10 solenoids instead.
Re: (Score:1)
Three servomotors? They built the thing like it was a delta 3D printer. They should have used 10 solenoids instead.
If all Android phones had the same screen size and input spacing, then yes, your solution would be more elegant. But they do not, so yours is not.
20 hours? I wouldn't worry (Score:2)
An Android phone will lock you out of entering a code, instead requiring email verification, after about 20-30 failed attempts. Good thing I also use a combo longer than 4 digits.
And what about most Android phones that are configured to use pattern lock? What about an Android phone that's encrypted, which uses a different entry panel and display for unlocking at boot time?
Nice toy, not really effective.
small upgrade to improve efficiency (Score:2)
Re: (Score:2)
Access to the hardware (Score:1)
Countermeasures (Score:1)
So, um, randomize the locations of each number (and not always on a small 4x4 grid) and possibly use captcha-like effects to frustrate OCRing the display? Of course even better might be to do something like MS research suggested, using pictures. But instead of mere pictures, use a whole host of pictures. So, your password could be cat, dog, cat, fish, airplane, or whatever (not unlike some knew captchas). I'd imagine that'd also encourage longer passwords, as every login is a new chance to see even more
Far easier method (Score:2)
Multiple styluses (Score:1)
I assume using around 12 styluses of fixed position would have allowed for much faster bruteforce (10 for the digits, 2 for the ok buttons). Moving a stylus around is simply too slow compared to down-up movements.