Комментарии:
Please, don't miss land to peoples. Can you show a hack of Samsung and Yale door locks?
ОтветитьIf I buy a £100 for font door it can be picked open if a buy 300 400 smart lock if can be hacked WTF
ОтветитьIf a criminal element is capable of doing this, then they deserve whatever they can snatch from inside my house.
ОтветитьI don't like the this door hacking method, it reminds me of my great-great uncle who was a Nazi during WW2, he killed tens of thousands of Jews, gay people, mentally Ill and deficient. He was a monster and the door lock is just like him.
ОтветитьSo both attacks require the "victim" to install malicious software from third parties?.. Got it.. they deserve it then.
ОтветитьThese guys are trying to get money from Samsung lol
ОтветитьJust watching this doesn't look like the initial attack, both require access to the Smartthings IDE so make sure you have 2FA on. The Third party app may reveal a passcode change but does not reveal the locks location. So do not put street address as your hub name. What is really disturbing is that the spokesman says they let Samsung know but doesn't say when or what their response was... Going public like this is just creating FUD and does not add to the security.
ОтветитьJust watching this doesn't look like the initial attack, both require access to the Smartthings IDE so make sure you have 2FA on. The Third party app may reveal a passcode change but does not reveal the locks location. So do not put street address as your hub name. What is really disturbing is that the spokesman says they let Samsung know but doesn't say when or what their response was... Going public like this is just creating FUD and does not add to the security. EDIT: Just noticed this is at least 2 years ago Wired just published on facebook... WTF
ОтветитьWouldn't connect door lock with a smart home....
ОтветитьIt is definitely ill advised to hook up your electronic door lock to your phone or any other gear of any kind, especially IOT devices are a no-no.
If you're going to use your smart lock with an RFID tag, use a shielded tag, where you have to slide part of the shield away in order to open your door.
Presumably, no lock will ever be perfect, but you just need to make it difficult enough to not be worth the time/effort for the burglar. For regular people, this should work out ok.
Jesus fucking Christ, I’m being stalked someone comes in and helps themselves to everything and anything, every time I leave my home. I just bought a Yale living lock, and I watch this shit! I might just as well leave the damn door open! I don’t understand why this is even allowed on here to show everyone how to do it? My life sucks!
ОтветитьThank you,most informative and well narrated
ОтветитьChrome enthusiast "hacking" with JSON. Okay.
ОтветитьOr you can stick a pin in the hole at the bottom of the keypad.. its the release.. but either way if i want to break into a house i dont care what kind of smart crap they got. Or door locks, whatever. The only thing that would deter me is a posted sign and the sight of a cctv or camera system or if they had bars over all their windows and metal case doors with metal frames.. thatd be a house youd break in and never come back out alive.. or in handcuffs.. rig up those grates that slam closed over every window and door and a speaker sysyem indoors. somebody breaks in and all the sudden shit closes and a-voice comes over the intercom, “would you like to play a game?” Lol. Ask em where they live and go steal their shit leave a note “ good game” then let em go...
ОтветитьStill dont know how. This didnt show me shit
Ответитьso you wrote a keylogger app, that's not really hacking in my mind, it's just malware.
Ответитьi just use bolts with 3 inch screws. We do have Smart tech here though, and never thought of getting smart locks. Just out of curiosity does Samsung encrypt these gadgets? Why would anything security wise accept extra coding? Set up should accept a code of up to six digits, and accept no extra code. If you need that then send it back to the manufacturer.
ОтветитьWhat about finger print id
Ответить30sec in and my stopped working I was like I got hacked to😭😭 high moments
ОтветитьIt's easier to kick the door open, or smash a window.
ОтветитьDo you want to develop an app?
Ответитьthanks, for installing and running malicious code on the hub connected to the lock, is not the same as hacking the lock.
Heck I'm looking for exploitable vulnerabilities like: Enter '9999' to program in a test code. This test code is a single use to unlock the door
Or Better yet, broadcasting an SSID with an open server
🙄 🤦♂️ this is about the same as sharing your real keys with a store to duplicate your keys while you keep shopping - which you should never do. Maintaining best practises is the REAL story here. At no point was the technology a problem. The users actions were!
ОтветитьAnd if it has no conection of any kind only code, fingerprint or cards?
Ответитьmy access code to my house is 357,... come on over.
ОтветитьSo not hacking just watching some dudes unlock a door with an app...lame
ОтветитьDon’t show us this. Now thieves r gonna know cuz idiots like u. Like honestly, if the president gives the news industry or whatever the football code for nukes, they’re literally gonna tell everyone. The news kept saying how they’re tracking terrorists and they kept changing and the news kept saying the new ways they’re tracking. America is fucking stupid. I’m American
ОтветитьI wouldn’t call it a hack if he developed the app and lock himself I would like to see a different hacker actually hack it himself.
ОтветитьAs you can see, clearly, after I submitted some JSON... the lock opens xD Is this an April's fool in the wrong month?
ОтветитьWith this being 5 years old, can you provide an updated version?
ОтветитьDang and I bet they went as the University too. If it was the kid individually. They would of payed him I bet. Shame
Ответитьlass="content">
<h1>Access Denied</h1>
<p>We're sorry, but you are not authorized to perform the requested operation.</p>
</div>
Their on android says it all really
ОтветитьThis is why you don't download 3rd party apps...
Ответитьgreat price easy to set up.
ОтветитьThe "Beware of Dog" sign is the best cost affective deterrent against impulsive criminals AND you dont even need to own a dog to use it
ОтветитьPlease, you can teach us to speak like this, Lock!
ОтветитьSo that’s blue tooth only right? What if you took that out of the lock? Can it be hacked then too? Or is it only local to the physical lock itself? Thanks
ОтветитьCame here after watching the id channel where a security guard hacked a girls smart lock and killed her
ОтветитьI thought 3rd party apps available on the play store were vetted by Google and checked for malware? I would never download an app without play protect.. I'm pretty sure that's the name of Google's vetting service..
ОтветитьThis is a phishing attack. The vulnerability isn't on the lock or the official software but on the end user. This only works on people with absolutely no knowledge of technology who will not buy a smart lock in the first place.
Ответитьwhy in the array you pass 8 as a number but 5500 as a string 😅
ОтветитьThis isnt really realistic, as you arent likely to use an app the guy whos going to be your burgler has created😂
Neither should you have to be worrying about the company that creates your lock, putting maliciouse stuff in there
Something more realistic would be a hacker sitting in his car near your house scanning bluetooth weaknesses to get into your doorlock and open it, or sniffing your home wifi to somehow find out more about the doorlock and maybe your account and somehow gain access to that
But this is just totaly stupid
Am i supose to expect a company that probertly makes milions selling smart locks to also go afther my 400 euro tv😂 ?
Or some app develloper that is smart enough to make a official looking app, for a smart lock to be intrested in stealing my 80 bucks airfryer ?😂
Usually the software is crap 😅
ОтветитьLooks like something that a traditional lock company would commission. Obviously BS, as other comments point out, but sows just enough doubt.
ОтветитьBro, what a stupid hack. If you have ALREADY the whole control of the device, what the fuck matter what kind of method you use?
Ответить