CONFIRMED Smart Meter Attack

  Рет қаралды 17,968

RECESSIM

RECESSIM

Күн бұрын

BECOME A PATREON!
/ recessim
This is the final step prior to dumping the actual smart meter firmware! Can it be done without removing the processor?
Check out the RECESSIM wiki for detailed photos and solder locations to modify your own hardware: wiki.recessim.com/view/Landis...
wiki.recessim.com/view/Advanc...
Landing Site: recessim.com/
Twitter: / bitbangingbytes
TikTok: / bitbangbytes
Discord: / discord
GitHub: github.com/BitBangingBytes
Music by Jason Shaw on Audionautix.com

Пікірлер: 93
@mikeselectricstuff
@mikeselectricstuff 2 жыл бұрын
A lot of the ringing you're seeing on the scope will be due to using the ground flylead on the scope probe - for this sort of work you really need to use an ultra-short (
@RECESSIM
@RECESSIM 2 жыл бұрын
Thanks Mike, appreciate the suggestion! I have those short spring ground connectors for the scope. I’ll test that out to see how it looks. I was curious about the ringing but more concerned about the capacitor decay time so didn’t chase it.
@liam3284
@liam3284 Жыл бұрын
With enough di/dt it becomes near impossible to avoid without differential probes.
@JuliansRandomProject
@JuliansRandomProject 2 жыл бұрын
Really enjoying this series! Keep it up.
@RECESSIM
@RECESSIM 2 жыл бұрын
Glad you enjoy it!
@darcylockhart
@darcylockhart 11 күн бұрын
Sweet. Thanks for taking the time to do this. Can’t believe you don’t have more likes
@JourneysADRIFT
@JourneysADRIFT 2 жыл бұрын
Amazing work. Been following for a while but am eager at how close you're getting.
@RECESSIM
@RECESSIM 2 жыл бұрын
I'm eager too! Will see what I can figure out this weekend.
@JAYG6390
@JAYG6390 2 жыл бұрын
Nice bling! A JTAG connection would be amazing :)
@RedlineAndGrind
@RedlineAndGrind 2 жыл бұрын
Love watching the work go into this, well done keep it up!
@RECESSIM
@RECESSIM 2 жыл бұрын
Appreciate that
@juliet0001
@juliet0001 2 жыл бұрын
love these videos
@iwontlagback7236
@iwontlagback7236 2 жыл бұрын
Dude I love these videos so much !! Great and easy to understand videos. Just wish they weren't spaced out so much
@RECESSIM
@RECESSIM 2 жыл бұрын
I’m trying to balance crippling perfectionism with increased frequency of posting. 😀 Glad you enjoy them!
@mjmeans7983
@mjmeans7983 Жыл бұрын
One security protection against voltage glitch attacks is by manufacturing a void in only some of the layers of the PCB under the chip with a Schmitt trigger like circuit in it to provide hysteresis to the power to prevent an undervoltage condition; power only gets to the pin if it is high enough and is cut off completely when it drops. You then have to unsolder the pin in order to perform the glitch, making it impossible to glitch in the field when under a time constraint. This is particularly difficult if the chip is a BGA (many have a central area without pins) where you cannot access the power pin directly and have to unsolder the entire chip.
@vasquezitosanchezito
@vasquezitosanchezito Жыл бұрын
Amazing work!
@Josh.Davidson
@Josh.Davidson 2 жыл бұрын
Awesome video and great work!
@RECESSIM
@RECESSIM 2 жыл бұрын
Thanks for watching!
@gammaleader96
@gammaleader96 2 жыл бұрын
very nice progress. I guess the difference in wire length can also be viewed as an impedance mismatch between the chip whisperer output and the node you pull down, if they were matched the longer cables should mostly add delay but should not change the pulse shape. A little offtopic but I really like your "oscilloscope probe tip" like extensions for your power supply wires, they seem like a useful thing to have. Looking forward to see what comes next. Are the pulse parameters a "universal constant" for this type of meter or do you need to tweak it for each unit? Since most capacitors have like +-20% tolerance, which will alter the pulse shape, I would imagine, that you have to slightly tweak them each time.
@ZeddZeeee
@ZeddZeeee Жыл бұрын
all these videos are really cool mix of reverse engineering the jokes and the smart metres combined, this is jokes and love every video, even the new ones that are hacking related, the the reverse engineering and exploitation are really neat. Cool to think about how things are made to work and how to make them work in different way that is better for you :)
@RECESSIM
@RECESSIM Жыл бұрын
Thanks for commenting! Glad you enjoy them. 😁
@tisme1105
@tisme1105 2 жыл бұрын
Will be interesting to take a look at the bootloader once the factory flash contents is dumped. Though it might be encrypted, so you'll need to dump it from memory after boot if so.
@RECESSIM
@RECESSIM 2 жыл бұрын
Definitely want to get the boot loader!
@philmcguire7346
@philmcguire7346 2 жыл бұрын
when you finally get this done your smart meter will be an antique! I enjoy watching though 8-)
@RECESSIM
@RECESSIM 2 жыл бұрын
The greatest gift they can give me is a new one to hack!
@philmcguire7346
@philmcguire7346 2 жыл бұрын
@@RECESSIM If they connect wirelessly could they not just patch the firmware, they could be checking the firmware is authentic on a regular basis for all you know? microsoft did this with xbox360 - they patched the drive firmware with an update through either a game disk or online update, it did not stop the hackers "c4eva" as he already had a silver bullet for microsoft but just hope you are aware that this could be the case? HACKING IS NOT A CRIME 8-)
@philmcguire7346
@philmcguire7346 2 жыл бұрын
would it not be easier to hack fobs? here in england we have fobs for the poor where they go to a shop and pay for their fob to be updated with x amount of gas or electricity for a price, ive often wondered if you could somehow spoof data on the fobs to get free energy, gas?
@danymogh
@danymogh 8 ай бұрын
This is underrated channel❤
@ferrumignis
@ferrumignis 2 жыл бұрын
I understand how glitching the processor during the serial I/O operation could reset a pointer and start it dumping program memory, but the I/O function is almost certainly looking for a null to terminate transmission and the program memory is certainly going to have a good number of zero bytes in it, so won't it stop prematurely?
@RECESSIM
@RECESSIM 2 жыл бұрын
That’s what I would have assumed to, but it must be causing a different issue because it’ll loop through the ENTIRE flash multiple times.
@ferrumignis
@ferrumignis 2 жыл бұрын
@@RECESSIM I was assuming the application code was written in C, but perhaps not? Since it's a high reliability/security application it may be something like Ada that uses a length word instead of null termination.
@ferrumignis
@ferrumignis 2 жыл бұрын
@Arpad Toth printf is able to print numbers in hex using the %X or %x format string.
@gunderd
@gunderd 2 жыл бұрын
It might be that the glitch is not resetting a value to zero, but perhaps all 1's instead, and if the value that got reset happened to be a "remaining count" value = eg. in code like: while (to_do > 0) { count=print_character(buf); buf+=count; todo-=count } - like what happens in _IO_new_file_write - then perhaps the glitch could result the observed behaviour?. It's really interesting watching the process of discovery here, and I'm impressed at the dedication shown to the cause!
@RECESSIM
@RECESSIM 2 жыл бұрын
@@gunderd It's beyond obsession at this point, like chasing my holy grail! :)
@Mentos3D
@Mentos3D 2 жыл бұрын
This is insanely interesting! Trying to glitch the processor when it is initializing the JTAG lockdown should be worth a try. Automating the check as you did with the serial output should be possible. Would it help to increase the diameter of the glitch cable so that It can drain the internal capacitors faster / more precise?
@RECESSIM
@RECESSIM 2 жыл бұрын
I am excited to give that a try, if JTAG could be unlocked with a glitch it would be quite a find! Generally outside of decreasing wire length, or increasing wire gauge people just remove the decoupling caps on the target board which has the same effect. Could make the processor a little less stable though, I was trying to avoid any other mods to the meter.
@MacGuffin1
@MacGuffin1 Жыл бұрын
So exciting! Reminds me of early 360 days...
@BuyitFixit
@BuyitFixit 2 жыл бұрын
Interesting Stuff! I've reverse engineered / repurposed some stuff myself in the past, but I'm mainly doing youtube video's on fixing electronic stuff these days.
@RECESSIM
@RECESSIM 2 жыл бұрын
It’s all related I feel, getting better at any aspect helps with the others. And it’s just fun and fulfilling figuring out how something works and then fixing it!
@BuyitFixit
@BuyitFixit 2 жыл бұрын
@@RECESSIM Totally agree. I used to love figuring out how things work. Those smart meters are a bit sinister how they can remotely disconnect. I wonder if people will create firmware so they are not as accurate at measuring in the usage in future..
@RECESSIM
@RECESSIM 2 жыл бұрын
@@BuyitFixit The world is a crazy place, who knows what creative things might come about… 😀
@mattanimation
@mattanimation 2 жыл бұрын
I live my life 100 nanoseconds at a time
@RECESSIM
@RECESSIM 2 жыл бұрын
Time on the grid moves at a much faster pace...
@alexandergreenfield91
@alexandergreenfield91 Жыл бұрын
Fantastic work, skills like yours are so very valuable to the human race. It would be fabulous to see you break down and reveal the internals and preferably firmware of a UK smart meter.
@RECESSIM
@RECESSIM Жыл бұрын
🙏 Any specific make/model of meter?
@alexandergreenfield91
@alexandergreenfield91 Жыл бұрын
@@RECESSIM British gas is probably the most prolific in the UK ATM. So that would be great but genuinely not sure how similar different meters here are at this stage. Thank you.
@kencabanaw4165
@kencabanaw4165 Жыл бұрын
KZfaq recommended this video. After watching a couple videos in this series, I wonder if the "energy bridge" utility companies provide consumers to read their own meter with, would more easily give up it's secrets. mine apparently uses z wave networking. I had to "pair" the device to my meter. I wonder if the pairing process is vulnerable?
@burlypenguin
@burlypenguin 2 жыл бұрын
Anyone want to start a pool if an exploit can be found to disconnect power? Battle Star taught me a great lesson. If you want to secure something don't put it on a network. If you can do it remotely, so can an attacker.
@TradieTrev
@TradieTrev 2 жыл бұрын
There's a 78 page document DEN 0083 from ARM that actually explains their device are susceptible to glitches ;)
@RECESSIM
@RECESSIM 2 жыл бұрын
@@TradieTrev This right here is why making videos and getting comments is AWESOME! Looks like I have my weekend reading lined up 😈
@RECESSIM
@RECESSIM 2 жыл бұрын
Indeed, only a matter of time. 15 years is a LONG time to expect a device to remain secure
@TradieTrev
@TradieTrev 2 жыл бұрын
@@RECESSIM "TBSA-M does not address laboratory attacks in which devices are unpackaged and probed, or power analysis attacks in which the power consumption of the device is correlated with its processing activity to extract assets." That's your juicy bit, have fun mate!
@joshuavillwo
@joshuavillwo Жыл бұрын
What movie is featured at 3:10? I like all your other taste in movies, but don't recognize that one, even though you've used it multiple times.
@RECESSIM
@RECESSIM Жыл бұрын
Short Circuit, 1980’s movie that arguably had the biggest influence on my interest in electronics and robotics.
@joshuavillwo
@joshuavillwo Жыл бұрын
@@RECESSIMoh really? I actually had that on my watch list, but assumed it was just a generic robot movie like Wall-E or something. In that case, I will definitely move it to the top of my list.
@freelancer917
@freelancer917 2 жыл бұрын
The slight variation in uC startup time after reset might be an oscillator or PLL waiting to lock?
@RECESSIM
@RECESSIM 2 жыл бұрын
That’s what I’m thinking too, it’s something that’s settling and can vary slightly each time
@freelancer917
@freelancer917 2 жыл бұрын
@@RECESSIM If the bootloader does an external memory access or sets any I/O pins, you could probably trigger off that. Assuming you want to glitch the transition after the bootloader has finished. Should be more deterministic than timing from reset.
@ahndeux
@ahndeux Жыл бұрын
That 1uF capacitor may be too large a value for your setup. Try a 100pf capacitor first.
@GrifFungin
@GrifFungin 2 жыл бұрын
✌🏻
@43ann
@43ann 2 жыл бұрын
This is super interesting, too bad I don't understand anything :-)
@RECESSIM
@RECESSIM 2 жыл бұрын
@BitBangBytes on TikTok if you want to ask any questions. I’ll reply with short off the cuff videos. Easier than higher production quality for KZfaq. Could also try KZfaq Shorts if anyone finds those a good way to post cell phone vids for increased updates.
@CarloRoosen
@CarloRoosen 2 жыл бұрын
So you actually do have the firmware now? Also, how can a puts() command print the entire firmware, I would expect it to stop once it finds a null character??
@RECESSIM
@RECESSIM 2 жыл бұрын
I am very close, not sure why the puts() doesn’t stop at a null when I glitch it, but it will loop through the entire flash multiple times. I let it run for an hour once and it seemed to end up in a tighter loop but still printing!
@CarloRoosen
@CarloRoosen 2 жыл бұрын
How did you know something like this could happen in the first place? You went looking for it and then it happened, I don't understand how this is possible without a full understanding of the mechanism. Normally when you insert randomness in a running computer program it will just crash.
@RECESSIM
@RECESSIM 2 жыл бұрын
@@CarloRoosen I have seen other attacks and read that you can insert some well controlled “randomness” and cause issues that don’t quite cause a crash, but cause unexpected things to happen. I experimented with this technique using a development board that uses the same processor and then moved on to the actual hardware I want to attack. Nothing is ever what people tell you it is… :)
@CarloRoosen
@CarloRoosen 2 жыл бұрын
@@RECESSIM Yes clear, I think I understand how you got to this point. The question remains, how is it even possible? After the glitch the processor is operating on its own. So there must be a state (registers & memory) in which useful things can happen not intended by the programmer. To me that is incredibly difficult to grasp. Like the monkeys typing Shakespeare thing. Anyway, I am looking forward to the next step.
@CarloRoosen
@CarloRoosen 2 жыл бұрын
Also, you should have more viewers ;)
@boceephus6374
@boceephus6374 2 жыл бұрын
Once you get it hacked, will you be doing any tests on the wireless capability of the meter? I would like to know if theres a way to shut the wireless off completely.
@RECESSIM
@RECESSIM 2 жыл бұрын
I’m hopeful that getting a copy of the firmware will answer questions like how the meters can be accessed remotely, how power can be turned on/off and how they could be disabled entirely.
@poddmo
@poddmo 2 жыл бұрын
What is the movie clip shown at 3:04 ?
@RECESSIM
@RECESSIM 2 жыл бұрын
Short Circuit - 80’s Robot movie
@poddmo
@poddmo 2 жыл бұрын
@@RECESSIM Ahh, thank you. Number Five is alive! :)
@MinePossu
@MinePossu Жыл бұрын
Don't give up
@RECESSIM
@RECESSIM Жыл бұрын
✊🏽
@TheMistysFavs
@TheMistysFavs Жыл бұрын
WHAT IF a neighbor has weaponized your smart meter and the EC WONT listen and it is being used against you with MUCH pain in my head? it was changed by some guy in Feb with NO knowledge of the EC...PLS HELP???
@king_jacob732yt4
@king_jacob732yt4 Жыл бұрын
they gonna be scared as hell
@tammiehinegardner9877
@tammiehinegardner9877 2 жыл бұрын
Had my smart meter removed.
@RECESSIM
@RECESSIM 2 жыл бұрын
They make you pay extra per month?
@tammiehinegardner9877
@tammiehinegardner9877 2 жыл бұрын
@@RECESSIM 5 dollars a month...well worth it I think...it was on the wall where my bed was...I swear it was making me sick....tinnitus, cramps, and other minor things.
@RECESSIM
@RECESSIM 2 жыл бұрын
$5 for peace of mind is well worth it
@Test7017
@Test7017 Жыл бұрын
☠️☠️☠️😭☠️😭🤣👍
@carfro8ify
@carfro8ify Жыл бұрын
So in other words, smart meters are no good?
@kc0eks
@kc0eks 2 жыл бұрын
Can't wait til an exploit is eventually found for millions of meters. Could be a wild time. Huge bills, no bills, no power... Weee
@Test7017
@Test7017 Жыл бұрын
😜😜😜💦👍
@393boss
@393boss Жыл бұрын
I got Tinnitus from being too close to my smart meter
IT TOOK ME 5 YEARS TO FIND THIS
12:08
RECESSIM
Рет қаралды 174 М.
Smart Meters, Nitric Acid and Microscopes
15:59
RECESSIM
Рет қаралды 89 М.
Playing hide and seek with my dog 🐶
00:25
Zach King
Рет қаралды 33 МЛН
Nastya and SeanDoesMagic
00:16
Nastya
Рет қаралды 28 МЛН
Reprogramming a Smart Meter
11:56
RECESSIM
Рет қаралды 22 М.
Smart Meter Hacking - Design Evolution
20:46
RECESSIM
Рет қаралды 7 М.
Can They Recover 7,000 Bitcoins??
9:02
RECESSIM
Рет қаралды 23 М.
Hacking the Power Grid - Their password is TERRIBLE! 😂
8:03
Smart Meter Hacking - Decoding GPS Coordinates
16:18
RECESSIM
Рет қаралды 24 М.
Java Is Better Than Rust
42:14
ThePrimeTime
Рет қаралды 146 М.
Smart Meter Hacking - Hardware Modifications
10:23
RECESSIM
Рет қаралды 13 М.
Tower Module 4 Stacked! | SpaceX Boca Chica
9:34
NASASpaceflight
Рет қаралды 45 М.
Ноутбук за 20\40\60 тысяч рублей
42:36
Ремонтяш
Рет қаралды 340 М.
iPhone 15 Pro Max vs IPhone Xs Max  troll face speed test
0:33
Какой ноутбук взять для учёбы? #msi #rtx4090 #laptop #юмор #игровой #apple #shorts
0:18
Красиво, но телефон жаль
0:32
Бесполезные Новости
Рет қаралды 1,5 МЛН
$1 vs $100,000 Slow Motion Camera!
0:44
Hafu Go
Рет қаралды 27 МЛН