EEVblog

Поділитися
Вставка
  • Опубліковано 8 вер 2024
  • How secure are electronic locks used on safes?
    Part 3 is where I show 5 ways to crack into a cheap safe! • EEVblog 1494 - FIVE Wa...
    Dave tries a basic first attempt power line analysis attack on a standard La Gard (LG) 3740/3750 Basic electronic digital lock on a CMI home safe.
    Can you crack an electronic digital safe lock with just a resistor and an oscilloscope?
    All sorts of safe cracking techniques are discussed - thermal camera imaging, bumping, drilling, and spiking the solenoid.
    And naturally there is a complete teardown of the La Gard lock and a demonstration on how it works.
    And then Dave does something incredibly dumb, and has to fix it the old fashioned way, Hollywood style.
    It's a tail of epic fails and stunning wins.
    Part 2 is here: • EEVblog #771 - Electro...
    Forum: www.eevblog.com...
    www.kaba-mas.co...
    ST ST62T25 OTP Microcontroller
    www.alldatashee...
    AT93C46 www.atmel.com/I...
    EEVblog Main Web Site: www.eevblog.com
    The 2nd EEVblog Channel: / eevblog2
    Support the EEVblog through Patreon!
    / eevblog
    EEVblog Amazon Store (Dave gets a cut):
    astore.amazon.c...
    T-Shirts: teespring.com/s...
    Donations:
    www.eevblog.com...
    Projects:
    www.eevblog.com...
    Electronics Info Wiki:
    www.eevblog.com...
  • Наука та технологія

КОМЕНТАРІ • 1,4 тис.

  • @marko247
    @marko247 8 років тому +62

    When you pulled out the 4-pin my first thought was "I bet he's going to talk about the lock for a bit then forget to plug it back in!" :D Well done sir!

  • @pierQRzt180
    @pierQRzt180 Рік тому +3

    I see a person that puts a personal fail online, I respect it and I like it. Few can do that.

  • @GadgetUK164
    @GadgetUK164 9 років тому +96

    Had me laughing my a** off a few times there, especially when you closed it with the power disconnected - doh! Brilliant work getting back into it, it was worth doing the video just for that!

    • @mpforste
      @mpforste 6 років тому +1

      Rather than cutting holes he could have gone in through the mounting holes and not damaged the safe using rods from the back

    • @Beaches_south_of_L.A.
      @Beaches_south_of_L.A. 6 років тому

      You don't think he thought of that? Mmmhmph. I think it's safe(theres a pun if you want it) to assume that that(cool a double that) is the first thing he looked into, considered, investigated thoroughly concluding that the only way was via drilling.
      I have to say that it's a little scary that you wouldn't immediately assume that as well and in fact felt it would be prudent of you to comment pointing that option out. You really do look kinda silly. Your comment is congruent with "I have to breath air in order to survive" or "grass is green" watch I'll prove it "Instead of drilling new holes he should have used the existing ones" see no difference "the sky is blue" it's just silly.

    • @hawaiipunch4192
      @hawaiipunch4192 4 роки тому

      I can open that faster than he can punch in the code. Pure trash

  • @Sevalecan
    @Sevalecan 9 років тому +119

    "You bloody ripper!", "Beauty!", "Bob's your uncle!","In like flin!", "Bobby dazzler!", "Winner winner chicken dinner!"

    • @nightshademagia
      @nightshademagia 7 років тому +5

      Sevalecan It's "I'm in like Flynn" (probably, I don't know)

    • @Sevalecan
      @Sevalecan 7 років тому

      Probably. I guess I wasn't braining hard enough.

    • @Ezric2
      @Ezric2 6 років тому +3

      Dave should sell shirts with those sayings!

    • @Desi-qw9fc
      @Desi-qw9fc 6 років тому

      “Just like a bought one!”

    • @69mrsteveo
      @69mrsteveo 5 років тому +1

      Yeah, he got off a few times this video.

  • @sghost128
    @sghost128 9 років тому +46

    You could also defend from power line attacks by programming the micro controller correctly.
    I suspect that since this lock strictly requires 6 digit pin all it does is store the numbers into memory regardless if correctness and when it sees six digits it compares the full string with the value stored in EEPROM. I could be wrong but this is how I would do it.

    • @supersat
      @supersat 9 років тому +7

      sghost128 You would need to do the string comparison properly (i.e. checking each digit and not bailing out on the first incorrect digit) but I assume they would do the right thing.

    • @666Tomato666
      @666Tomato666 9 років тому +6

      sghost128 yes, you'd need to use a constant time algorithm

    • @aylons
      @aylons 9 років тому +9

      sghost128 Actually, it can be even more secure than that: it can always hash the new code, no matter how long it is, and compare with the stored hash. This way, there is no need to lock to a specific the number of digits while still making the same process every time a new digit is typed.

    • @PeregrineBF
      @PeregrineBF 9 років тому +4

      Aylons Hazzud You still have to make sure your hash comparison is constant-time. That's not hard though.

    • @aylons
      @aylons 9 років тому +9

      Also, having a different time for each number of digits inserted is not a problem, because this is information the attacker already has (after all, they are inserting the digits ).
      It must only not change according to the correctness of the code so far.

  • @twothreebravo
    @twothreebravo 5 років тому +7

    "I forgot to reconnect the Solenoid to the lock"
    You're my spirit animal.

  • @int53185
    @int53185 9 років тому +15

    I thought at first that you fried the processor! Then I remembered the plug..LOL.

  • @GadgetAddict
    @GadgetAddict 9 років тому +33

    Do the same with a $50 safe. I know they can be physically bumped and some simple short circuit attacks but I wanna see more advance techniques!

  • @Teth47
    @Teth47 9 років тому +210

    Eeh, I don't need a safe. I live in Canada, our burglars call ahead to let us know they're dropping by, don't want to interrupt dinner or anything...

    • @kjaxky
      @kjaxky 5 років тому +17

      Teth47 they apologize as they rob you too

    • @BigEntTV
      @BigEntTV 5 років тому

      Yeah I’m telling you

    • @stevegarroutte8947
      @stevegarroutte8947 5 років тому +4

      Thats toooo funny i like Canadians except the French speaking one are kinda stuck up it seams, but i like the rest just fine i ve known alot and all have been good folks (except the Frenchies sorry just my experience most French speaking people are stuck up except the cagons from the southern us ive met

    • @Ehadley69
      @Ehadley69 5 років тому +2

      Whenever I get a new mobile I program into my dictionary:
      "aboot- about (Canadian)" and
      "soory- sorry (Canadian)"
      ... it makes me feel worldly.

    • @DownTownDowns
      @DownTownDowns 4 роки тому +4

      You must not be from Toronto or Quebec lmao

  • @zushiba
    @zushiba 9 років тому +2

    Man I love these videos. I have no actual idea what's going on but it's fun as hell to watch. I find myself wishing I had even a quarter of this guys knowledge of electronics.

    • @aarontooth
      @aarontooth Рік тому

      If you really want to know, you can go to engineering school.

  • @samthenerf
    @samthenerf 9 років тому +13

    I never thought I would see Dave Jones break into a safe laparoscopically.

    • @EEVblog
      @EEVblog  9 років тому +5

      samthenerf Word of the day!

  • @BimbusBucklenuts
    @BimbusBucklenuts 6 років тому +1

    Cheesy, but you're sincere and I like how you explain even how you failed and show how you fixed your mistake. Really fascinating video for different methods of non-invasive attacks.

  • @liquidthex
    @liquidthex 9 років тому +36

    This is like my favorite episode ever

    • @EEVblog
      @EEVblog  9 років тому +5

      liquidthex Glad you liked it!

  • @bernardlemay8563
    @bernardlemay8563 5 років тому +2

    Watching this for the second time in a few years. This is truly fascinating. As an electrical engineer myself I find great enjoyment in watching your videos. Cheers from Canada!

  • @coreliner8972
    @coreliner8972 8 років тому +27

    I wonder if you could just use a neodym magnet on this one too. Many electronic safes can be opened by a big magnet to trigger the solenoid inside. Takes on average 5 secs.

    • @jaseastroboy9240
      @jaseastroboy9240 5 років тому +10

      Some of the magnets that are readily available today were probably not available when this safe was designed. Would be interesting to see what a crazy powerful magnet could do. That little pin might not move with gravity assistance (dropping it) but if even a small amount of magnetic field was able to penetrate it may move it. Not only would it be quick but it would also be non destructive. Might also be a handy rescue for those times when you forget to plug the solenoid cable back in. :)

  • @FranLab
    @FranLab 9 років тому +126

    Love that FAIL button!

    • @tenshi7angel
      @tenshi7angel 6 років тому +1

      The sad part is, I can relate to that level of dumb. :(

    • @46bovine
      @46bovine 4 роки тому

      I think it's dumb and overused!

  • @zubirhusein
    @zubirhusein 9 років тому +106

    Shoutout to Clint

    • @Dan-TechAndMusic
      @Dan-TechAndMusic 9 років тому +3

      2chws Maybe Basinger?

    • @farLander1
      @farLander1 8 років тому

      +Daniël's Tech & Music Channel This is far from Oddware

  • @o0julek0o
    @o0julek0o 9 років тому +2

    Pretty sure this was the best episode ever, Dave. I've been watching your videos for about a year and a half now, and being the noob that I am, most of them were hard to follow, but this one? This one was perfect! Understood every single bit! 🙌 Real bobby dazzler.

  • @quincy8557
    @quincy8557 9 років тому +86

    The safe was inspected by 'Clint', must be 100% secure

    • @userPrehistoricman
      @userPrehistoricman 9 років тому +4

      quincy8557 Probably an internal alias.

    • @SONOFAZOMBIE2025
      @SONOFAZOMBIE2025 9 років тому +7

      Prehistoricman no, it is definitely Mr. Eastwood

    • @quincy8557
      @quincy8557 9 років тому +1

      Son of a Zombie I did think that Mr Zombie

    • @mahound9
      @mahound9 9 років тому +10

      quincy8557 I know Clint, he inspected my shit. He's solid. Solid bro.

    • @nightshademagia
      @nightshademagia 7 років тому +4

      Who, Mr Clint Basinger of Lazy Game Reviews? I would definitely feel secure if my safe was inspected by him.

  • @ianmontgomery7534
    @ianmontgomery7534 3 роки тому

    I did QC checks on some of the cheaper units in China prior to our acceptance of them. I found that you could open them with a bump on the top before they were installed but once bolted down you couldn't. I couldn't work out why that was so. I also had my laptop in a hotel safe and it would not open with the code I set. I asked the girl in charge if she could open it for me using the master code. She did not know whether it had one so i took a guess and used the factory code - yep it opened so then I had her get the manager and I showed her how to reset all her safes with a new code. She was really grateful, especially as i hadn't just kept quiet and opened the other safes!

  • @viesturssilins858
    @viesturssilins858 9 років тому +133

    Dave, could you please check the patern when entering the last digit? I wouldnt expect any comparing beeng done before all digits are entered, they would just be saved. But it is possible, if the programer was lazy, that when the input string of digits is compared with the saved passcode, the comparison rutine breaks as soon as a difference is found, so you could se which of the entered digits was the first incorect one.

    • @cyrex686
      @cyrex686 9 років тому +4

      Viesturs Siliņš I like this idea, seems plausible.

    • @userPrehistoricman
      @userPrehistoricman 9 років тому +15

      Viesturs Siliņš So we can tell via the scope if the digits entered are correct? Wow, this seems useful.
      Anyway, there definitely will be a different power draw when the correct digits are put in because the solenoid is powered.

    • @WeAreGRID
      @WeAreGRID 9 років тому +4

      Viesturs Siliņš Doesnt matter, once you put in all the digits if all it does is compare, theres no variation to tell you what digits are right, and you already know that it will be wrong, because its the wrong numbers.
      This method would be just as fast as just putting in all the possible number combinations, because thats all youd be doing.

    • @viesturssilins858
      @viesturssilins858 9 років тому +23

      WeAreGRID
      Not quite!
      If the comparison is of a straightforward implementation, meaning you can tell which digit is the first not to match by examining the running time, then you can tell if the digits you entered match _by individual digit_ as opposed to _by the whole string_ .
      And that means that instead of trying 6 digit variations (10^6 = 1 000 000), you only have to try 10*6 = 60 as the worst case!
      In average it would be 5*6 = 30 tries, and, if the safe has 5 minute timeout after 4 tries, you get average cracking time of about 40 min. Not fast, but doable!
      It all depends on the comparison routine, it would be very easy yo implement a special comparison algorithm that takes a constant time no matter how soon the comparison fails.

    • @viesturssilins858
      @viesturssilins858 9 років тому +19

      Prehistoricman
      If the comparison routine is of a standard implementation then possibly yes!
      Unfortunately the easily measured solenoid current can not be used because it only operates if all the digits ar correct, but we want to know which digit is first in the string to be false.
      For example, if the comparison is not secured, the scope could give us the following information:
      Lets say correct string is 123456 and the CPU spends 50us doing various housekeeping tasks that make up for a constant overhead and additional 5us for every digit comparison
      At first we try entering 000000. And the scope shows 55us CPU activity - that means that the very first digit is wrong.
      Next we try 100000. Now the activity period is 60us long. From that we can learn that at least one more digit matched because the CPU had to process more of them an took longer.
      Now we know to try only 1xxxxx variations and move on to guessing the second digit by looking which one gives at least 65us delay.
      We don't need to know how long exactly he CPU does the comparison, we just try out every digit in first position until the activity time increases and then move on.

  • @tcpnetworks
    @tcpnetworks 9 років тому +6

    I have one of those cheap, Bunno's safes!
    I use it as a DECOY! :)
    My CMI floor safe (concreted in!) is elsewhere...

  • @ChrisPVille
    @ChrisPVille 9 років тому +7

    The code is always 6 digits, so I assume they are comparing the input with the secret key only when all digits are entered. With a sensitive enough power analysis, you should be able to detect which digit was incorrect as the micro iterates over the input and key. Even with a constant time comparison of the two, some flag or register in the micro will be set on the first wrong digit (otherwise your comparison would never fail).

    • @aarontooth
      @aarontooth Рік тому

      Can a power analysis realistically discriminate a single bit difference, presumably SRAM or whatever this thing has?
      I assume the "loop" would compare or subtract or xor each position and then add/or them up.

  • @benshaw2770
    @benshaw2770 4 роки тому +1

    "Bob's your your uncle!" This video was really informative and fun to watch. I look forward to catching up on your other videos mate! Thanks!

  • @raymundhofmann7661
    @raymundhofmann7661 9 років тому +5

    As the battery connection is exposed, maybe it can be hacked by applying weird over-/undervoltages, negative voltages or combinations of that?
    You also could use near field antennas (near the keyboard) used for emv probing to sniff.
    You could make use of a more elaborated (low R) current sensing with higher bandwidth.
    You could use more elaborate data processing on the captured signals, you could correlate antenna signals and wired signals (power current).
    BTW, how does disconnecting the battery affect the safety lock out time?
    Even if it is stored in eeprom, one may detect a false attempt prematurely and shut off the power just before it can store the failed attempt lock out time in eeprom, if it does that anyway.
    And then you can probe the circuit at any point if you get a "sample" but not limit yourself to working with the TUA (Target Under Attack).
    You see, if you want to spend the time, there is a lot more one could do... May not be worth it except for the experience gained.

  • @userPrehistoricman
    @userPrehistoricman 9 років тому +22

    There's a video on UA-cam called DEF CON 21 - Melissa Elliott - Noise Floor Exploring Unintentional Radio Emissions
    If you have a safe-shaped antenna, you should be able to "hear" the IC checking against the known combination, even through all that metal. Hey, you could even stick an antenna inside the safe through a bolt hole and use the safe as shielding from background crap.
    Every time a button is pressed (or 6 numbers are entered), there will be a check in the form of a loop. During this loop, you should be able to inspect numbers inside the IC from the intensity of emissions from the data lines. Enter 4 random codes, and inspect what frequencies are the same in each emission. This should be the correct code.

    • @toonv4023
      @toonv4023 9 років тому +6

      Prehistoricman Yeah, those DEFCON speeches are really awesome and interesting. They trigger your inner hacker mentality.

    • @reggiebacci
      @reggiebacci 9 років тому

      Prehistoricman I've seen her before, she's really good. Think that's the one where she uses software defined radio to listen to the display bus on a laptop and reconstructs the screen. SDR compatible dongles are dirt cheap on ebay too.

    • @frankfahrenheit9537
      @frankfahrenheit9537 9 років тому +1

      Prehistoricman Only an idiot programmer would check for (in)correct digits BEFORE the 6th digit has been entered. This check would probably consume different power depending on the result. So, only do one final check, and nobody can intercept intermediate results (since there are none).

    • @toonv4023
      @toonv4023 9 років тому +1

      Frank Fahrenheit Wether to check during or after entering doesn't matter. When you loop trough an input buffer and break out at an incorrect digit, the parsing time gets altered too. As long as your checks don't break the loop and the difference between correct or wrong doesn't show up on the powerline either, you are safe.

    • @remuladgryta
      @remuladgryta 9 років тому

      Toon v Loop and break is also an unsafe method of comparing the code in this instance. The smart thing to do is add the inputs up into a single number, and compare that to the correct code. Doing so in the same number of instructions regardless of correct or incorrect code is fairly trivial.

  • @pvc988
    @pvc988 9 років тому +41

    You can also try undervolting that thing to make the software crash (and possibly flip that one magic pin high; these tiny MCUs don't have any notion of memory protection; they will execute whatever crap happens to come into the instruction stream) or overvolt it. It's common for MCUs to short pins high or low when they are fried. If that doesn't work... overvolt it massively (like 10-30 kV or so) then the spark might jump to the right spot.

    • @userPrehistoricman
      @userPrehistoricman 9 років тому +8

      pvc988 Second thought about crashing the IC. If the chip is made unstable after inputting 6 digits, it's possible that it will start executing data in the combination you entered. Depending on how these digits are stored, you may be able to write a 6-byte program to unlock the safe. It's unlikely but it would be one heck of a cracking job if it worked.

    • @sarowie
      @sarowie 9 років тому +5

      pvc988 under voltage sounds interesting, as it should not be too harmful. Overvoltage on the other-side: I think I saw a diode in there. This diode may act as an overvoltage protection. Given the LC-circuit formed by the wire and the decoupling, it would be tricky to get around the diode (and not to fry something in the process). But frying would be fun also (for the theft): Looking out the owner

    • @bobshowrocks
      @bobshowrocks 9 років тому +6

      If they designed this lock correctly (and it seems like they did) then there would be a brownout detection circuit to keep the micro in reset until a usable voltage is available. Most modern micros have a brownout detector built in, but it's also very common to have an external one as well.

    • @pvc988
      @pvc988 9 років тому +7

      Believe me, I've analyzed many of the embedded device's firmwares and I could probably count properly coded brown-out detection/handling routines on my fingers. It is one of the most neglected things by the programmers.

    • @naquiniv5930
      @naquiniv5930 9 років тому +14

      pvc988 sounds like a job for *****

  • @jackneff179
    @jackneff179 9 років тому

    LOL Dave, as a locksmith here's how I would do it. You already have holes in the back. What we usually do is take a light or camera as you have with a long screwdriver and disassemble the lock from the back. That will usually give you access to the deadbolt mechanism and using long screwdrivers manipulate the bolt mechanism opening the safe!!!

  • @ThomasWeeks
    @ThomasWeeks 9 років тому +4

    Hey Dave,
    One of my main concerns with electronic locks is at the firware/code level and being guaranteed that there are no secret code or keystroke backdoors. I was hoping after IDing the micro version, that you would try to pull out the machine code listing and examine it for manufacturer backdoor entry codes.
    Unless these safes can be audited and proved safe (through things like code hashing), I fail to see how they can be trusted at all over, say, mechanical locks..
    Tweeks

    • @JoeyMoreland
      @JoeyMoreland Рік тому

      And your fear was proved real today.

  • @remsensor
    @remsensor 8 років тому

    I've always had a knack for lock picking and safe cracking. Picked my first lock on my parents front door when I was 7. I also learned really fast how worthless those lock boxes are. I used a screwdriver... a screwdriver to open up a sentry safe key lock box as well as figuring out the bump method on digital safes in my teens. I never did understand the purpose of any kind of safe aside from fire/flood protection that isn't bolted down or very heavy. Anyone who uses them is pretty much sending the message of "Hey I put all of my valuables all in one location inside an easy to carry box that can be carried off and broken into later."

    • @SianaGearz
      @SianaGearz 8 років тому

      That kind of message can be useful, in case valuables are really outside the safe in an inconspicuous spot. To make the distraction complete, place things into safe that LOOK valuable or important or unique but really aren't.

  • @EricDenny
    @EricDenny 7 років тому +10

    I genuinely love your channel sir! That said, I don't ever have time to finish one and find myself skipping through them trying to catch the good parts. If you would filter your words to just the interesting parts, I bet you could reduce your 45 minute (average) videos down to about 20 minutes. Then, I could actually manage to finish one of your videos! You pick great topics but PLEASE maybe try to make them a reasonable length! Most people in this line of work, including myself, simply don't have hours a day to spend on UA-cam. Just a polite suggestion

    • @JordanBartholme
      @JordanBartholme 7 років тому +1

      Eric Denny watch it on 1&1/2x

    • @ShALLaX
      @ShALLaX 5 років тому

      I’m exactly of the same mind. Very interesting videos, admirable with regards to how faults of the user are admitted, but a good percentage of the video goes by with “yes, I understand, please move on” in the back of my mind. One thing to keep in mind is you’d miss all of the Australian “charm” if these were shortened ;)
      Maybe a “digest” version of each video?

  • @Macewan1234
    @Macewan1234 6 років тому

    I'm Australian, lived in the bush, worked on farms, on the coast, multiple states and I have not once in my 24 years heard someone say "bobby dazzler". Classic, good video mate very interesting.

  • @s0r0s
    @s0r0s 9 років тому +17

    I would try to capture lock's behavior after entering all 6 digits. It's doubtful that controller compares every entered digit. I bet it reads them in a buffer and then compares. This is the time to catch it.

    • @brianwild4640
      @brianwild4640 4 роки тому +6

      That would tell you when the 6 digits are wrong or right but we would know that anyway it would open or not

    • @Si74l0rd
      @Si74l0rd 4 роки тому

      Yeah, I'd have looked at correct key followed by incorrect and all the permutations upto the full six correct numbers Vs six incorrect or five correct and one incorrect. Seems like a bit of a half arsed job unless there was a lot edited out..or unless he found a good powerline exploit lol. Not everyone is LPL showing everyone the hidden secrets right out in the open. Didn't end so well for Barnaby Jack :/

  • @ThoughtCrimeCriminal
    @ThoughtCrimeCriminal 4 роки тому +30

    EEV: This lock is pretty damn secure
    Lock Picking Lawyer: Hold my beer

    • @patc4624
      @patc4624 4 роки тому +1

      Watch his account longer and it would be "hold my gun" seems like hes a hell of an avid collector.

    • @revrev1679
      @revrev1679 4 роки тому +1

      Angle Grinder Guy: Hold my extra batteries

  • @h11angel
    @h11angel 9 років тому +4

    this is bloody brilliant! rarely have I been so entertained. I love you, Dave!

  • @NoxMarcus
    @NoxMarcus 9 років тому

    Well this turned out to be a fun episode. The road to success truly IS paved with failure.

  • @oholimoli
    @oholimoli 9 років тому +4

    Try to find the resonance frequency of the little spring and use a suboofer with this frequency. The pin should then vibrate and if you are lucky you can open the safe or damage the spring an turn it on its side. :-)

    • @oholimoli
      @oholimoli 9 років тому +1

      Update: To find the right frequency try to disconnect the battary and measure the power pin for some induced current

  • @d.e.bunker5311
    @d.e.bunker5311 9 років тому

    At 11:15 Dave learned the first rule of working on safes: After touching anything, ALWAYS test the lock (and boltworks) with the door open! Also, the value of 12" (longer if you can find them) alligator forceps.
    How did he close the door? The lock bolt stays retracted until the "dial" is turned counter-clockwise extending the bolt, the spring pushes the slide down and the solenoid pin pops out securing the bolt.
    I am retired, have always lived in the US and my work was mainly with US made safes.
    ATTACKS:
    1) Bumping the solenoid -- The solenoid operates in the same direction as the bolt on the lock. Bumping might retract the solenoid pin, but the lock bolt is also being bumped and will put pressure on the slide which in turn puts side pressure on the solenoid pin keeping it from retracting.
    2) Removing lock cover from the back -- Dave didn't show everything. When the lock cover is removed a relocker inside the lock is activated, stopping the bolt from retracting. If it hadn't been removed previously, he defeated it off-camera and judiciously did not discuss it.
    3) Drilling -- There is a lot going on in a very small space in the body of a combination lock for a safe; electronic or mechanical. Drilling is not just having the right equipment, it is also expertise and finesse. Without intimate knowledge of the lock and the safe, drilling will likely create a more difficult lockout.
    50 years ago the hardplate protecting vital areas of burglary resistive safe had a minimum hardness of Rockwell C60 and the science of hardplate advanced significantly over the years. At the time I retired, some hardplate was absolute hell to penetrate and by no means did I see it all. If Bob Burglar successfully penetrated modern hardplate, he would be one in a million.

  • @JosefdeJoanelli
    @JosefdeJoanelli 9 років тому +4

    I couldn't stop laughing when I realised what happened (at around 8-9 min mark). We have all been in a situation like that at least once, where you just feel like the ultimate noob lol and Dave Jones' reaction was priceless :)

  • @megaspudjasny
    @megaspudjasny 5 років тому +1

    Fun story: an educational institute local to me has electronic locks inside that use swipe cards (though the readers aren't connected, the staff just use keys instead) and the actual electronics for the locks are on the outside of some of the doors! Even better, they're all powered on the same circuit, so just opening one and shorting it with a screwdriver blows the switchboard fuse and opens EVERY LOCK IN THE BUILDING! Genius!

  • @AureliusR
    @AureliusR 7 років тому +18

    He thinks he's detected a packet -- it's just the beeper! LOL!

  • @ExtantFrodo2
    @ExtantFrodo2 9 років тому

    I love it when a push button lock has been in use for years and the buttons for unlocking it are all worn. Vegetable oil on the buttons would reveal which buttons were pushed without necessarily being noticed by the owner. This trick also works in some cases to detect if something was disturbed in your absence.

  • @gigicaly
    @gigicaly 9 років тому +6

    yeah you screwed up on the wire but watching you putting it back was very entertaining..it was way better than those Hollywood movies :)

  • @greegor4719
    @greegor4719 9 років тому +2

    Why assume that the beep on scope was after the key was evaluated at all?
    Since it beeps for EVERY keypress, no decision is needed before that.
    All of your analysis was BEFORE the beep but processing delay could
    easily be AFTER the beep in the waveform.
    Suggestions I liked the best from UA-cam comments:
    1. get a super long screwdriver and reach through
    back mounting holes to unscrew entire deadbolt mechanism.
    (hard brittle steel rod less spring? You might want the rod to
    have just the right hardness/temper to be less springy!)
    2. drill tiny hole from left side directly into end of deadbolt,
    then push it back with a steel rod.
    3. undervoltage, overvoltage and kilovolt surge
    4. more elaborate power analysis ( after the beep! )
    5. Malicious power conditioning (frequency)
    cue the Mission Impossible music... LOL
    I wonder how many people have put safes into
    their basement floor and had contents destroyed
    by flooding?
    I found this in the archive:
    We recently opened a safe in Rancho Mirage. The home was unoccupied this past summer and when the home owner returned they found their house was flooded with several inches of water. There had been a leak in the Plastic supply line to the refrigerator. Several months later we were called to open their floor safe which had been flooded and rusted in the flood. The safe would have been in better shape had we been called immediately after the flooding Rust had taken over most of the safe and water was stagnant.
    We were able to open and repair the safe to good working order but any paper work they had in the safe was destroyed. We advise customers to call us immediately after flooding to prevent water damage and rusting to the safe. We also advise customers to keep important documents that are stored in a floor safe in tight plastic Ziploc baggies to preserve the contents. Home Flooding is a common occurrence especially with part-time residents.

  • @graemegets478
    @graemegets478 9 років тому +6

    I would not expect to see much on the power line for digit entry. The software would (should) just store each digit without any judgement on the individual number until it has all six numbers and then it would do a compare in which case its too late. Its not going to decide as you type each number in. There will be a time-out between numbers so that you do need to type them in with in a certain time period before it trashed what's already been entered.
    But great video - loved the cheesy version of mission impossible :-)

  • @maykevin5
    @maykevin5 9 років тому +2

    i think the wave form drop is from storing the number in memory. The validation is when the last number is pressed. The wave form will change depending on if the validation is wrong or correct.

  • @EVguru
    @EVguru 9 років тому +4

    Tim Hunkin has some interesting mechanical safe cracking stuff on his website and his 'Secret life of Machines' stuff is well worth tracking down. There are also some safe/lock cracking anecdotes in 'Surely you're joking Mr Feynman'.

  • @mfx1
    @mfx1 9 років тому

    Not sure if anyone else has mentioned (Dave didn't on the video) it but there is a spring loaded anti bump weight opposite the solenoid. Any impact big enough to move the solenoid plunger will also force the anti bump plunger into the hole.

  • @dizzolve
    @dizzolve 7 років тому +7

    Thanks for making us all feel human Dave

  • @11202
    @11202 7 років тому

    The noise of protest the safe makes against being inspected at 1:29 is hilarious to me even months later.

  • @OliverCovfefe
    @OliverCovfefe 9 років тому +14

    11:50
    YOU HAD ONE JOB. ONE!

  • @sik3xploit
    @sik3xploit 6 років тому

    I was choking on some laughter here. A fine video sir.

  • @eformance
    @eformance 9 років тому +6

    You didn't try:
    Low voltage attack (brown out, slight power differences between the eeprom and processor, leading to "0" being read for all positions)
    Power glitching attack (modulating the input power to cause glitches)
    Power-up analysis (does it read the eeprom on initial battery attach?)

    • @cybergibbons
      @cybergibbons 9 років тому +2

      eformance a no-name Chinese lock in a similar style had the vulnerability of reading an I2C EEPROM at power up. The keypad was also connected via I2C, so you could trivially sniff the EEPROM data.

    • @dickcheney6
      @dickcheney6 8 років тому

      +eformance A low voltage attack? I would think the safe designers would have thought of that, simply because the safe runs on a battery. Otherwise, I could type in the wrong code, but by luck, it opened anyway because a dying battery confused the safe! For that matter, I could use a battery with a resistor or two, or bring one I know is almost dead.

    • @philmcgroin
      @philmcgroin 6 років тому

      Phil McGroin

  • @JohnDoe-qx3zs
    @JohnDoe-qx3zs 8 років тому +1

    Some things he didn't try on the electronics side: 1. Use signal filtering and processing to undo the effect of the bypass caps (they only reduce the power draw AC amplitude, they don't remove it completely) . 2. Look for AC waveforms in the CPU clock range and above, then compare those. 3. Look at the total mAs consumed by different input conditions. 4. Compare a full 6 digit signal for right, slightly wrong and completely wrong codes. Look at what disturbances can be injected by applying high frequency noise (higher than CPU clock, maybe even GHz) on that power line. You may be able to destabilize the microcontroller. Next, figure out if destabilizing it at a specific time during the input sequence would open the lock. (Other obvious points have been mentioned by others in other comments) . Of cause, once an attack is found, it can be reduced to a smaller dedicated circuit so a safecracker won't need to carry around 10kg of lab gear.

  • @EcProjects
    @EcProjects 9 років тому +9

    This was very interesting to watch ! :) Great video, Dave!

  • @thomasbonse
    @thomasbonse 8 років тому

    What is even more effective from the manufacturer's side, and relatively simple
    in terms of implementation is to use a buffer approach. By this, I mean
    that as a manufacturer you load each keypress into a memory buffer and
    only process validity after the last buffer (fixed or configured) has
    been filled. This results in a much more difficult, albeit not
    impossible, method to mitigate an attack via the power source. This
    simple change from a per-digit calculation also minimizes the number of
    components required on the board (ie capacitors for decoupling
    purposes). Additionally, this approach wouldn't even be noticeable to a
    user and the calculation can be through a very simple == operation in a
    microcontroller or a series of gate-level operations if done through an
    ASIC or FPGA. With the gate-level operation, you would first perform an
    XNOR binary operation between the corresponding bits of the known key
    and the provided key. With the low output from each XNOR operation
    followed by a cumulative NOR operation (multiple OR gates to combine
    down the number of bits to a single NOR gate that performs the final
    calculation).
    In the case of solenoid operated safes like this, an even
    easier method would be to use a sufficiently strong electromagnet to
    pull the solenoid back manually from outside the safe, which then releases the catch, such that the 'knob' can be turned to open the safe.

  • @bsvenss2
    @bsvenss2 9 років тому +7

    *ROFLMA*
    Epic! Priceless! One of the funniest thing I ever seen on UA-cam! I wish I had 1000 thumbs up to give you Dave... but you only have 860 videos or so. ;-)

  • @WesterlySunn
    @WesterlySunn 9 років тому

    Don't you just love a challenge... Particularly when it involves extricating one's self from a sitchy-ashun of one's own creation.. LOL!

  • @finnigan16
    @finnigan16 9 років тому +12

    Dave,
    You mention that you can replace the keypad in the event that it breaks, so you must be able to do so without access to the interior of the safe, is that correct? If so, would it be possible for someone to replace the keypad with one containing some kind of keylogger? That individual could potentially return after the safe owner has accessed the safe and obtain the code.

    • @TheAmpair
      @TheAmpair 6 років тому +3

      finnigan 16 That is a devil of a lot of miscreant effort to access some cat photos. (Likely content after owner estimates this safe's ability to protect the contents in the event of fire.) ;-)

    • @Si74l0rd
      @Si74l0rd 4 роки тому

      I've used a larger capacity, thicker armoured safe with the same keypad/knob combo, in a medium sized retail business and that was storing the Christmas takings, as well as the rest of the year when there wasn't much worth having lol. It was however bolted to the floor, and was cut through with angle grinders in one memorable instance, mostly because they used our own stock from the shelves to do it! It's a common enough set up, though the quality of the internal circuitry may have changed over time or between models.

  • @antonnym214
    @antonnym214 4 роки тому +1

    In the States, we call the clamp forceps "Hemostats" because doctors use them to stop the flow of blood in vessels. You should see mine. much longer than what you have there. Would have come in handy. Not to worry! Great video all around, seriously. All good wishes!

  • @djaysenpai
    @djaysenpai 9 років тому +7

    wow this fail button couldn't be more appropriate, damn

    • @Baerchenization
      @Baerchenization 9 років тому +6

      djaysenpai Imagine it had been locked in the safe ! ;)

  • @draken1511
    @draken1511 9 років тому

    The lock doesn't have a bump vulnerability because of the extra part on the other side of the solenoid and catch slide. When you bump it to drop the rod into the solenoid, that chunk on the other side drops a pin into the catch! Pretty simple yet smart way to prevent it from being bumped/dropped to open.

  • @Aussie50
    @Aussie50 9 років тому +9

    I wonder how those $300+/- ebay gunsafe locks fair, I know the safe has to be bolted to the wall and floor by law but if the crooks managed to get it loose I bet they could bang it on the floor a few times and release the lock. i will have to take a poke at mine before I install it and store valuables in it, might have been a waste of money.

    • @EEVblog
      @EEVblog  9 років тому +3

      Aussie50 No new safe costing $300 is any good. First step is, if it's not (oz only) a CMI, Chubb, Lord, Guardall, or Burg Wachter then it's likely crap. Only La Gard, Chubb, or S&G locks are worth their salt.

    • @BenjaminEsposti
      @BenjaminEsposti 9 років тому

      What you ultimately need is a dog!
      Even just putting a warning sign that says "Beware of dog" can deter thieves ... yet there are those who don't even have half a brain :P
      They likely wouldn't be able to figure out how to get it open any way xD

    • @moqmar
      @moqmar 6 років тому +1

      MrJohnny56789 If you didn't store it correctly, that's completely reasonable I'd say.

    • @araibirshad8294
      @araibirshad8294 6 років тому +2

      Damn. I didn't know Dave's audience consisted of insecure Ameritard gun nuts.

    • @SnapBrandy
      @SnapBrandy 5 років тому +1

      @Mr. Morningstar You are so right. I hate the gun laws in Australia. Notable three hours away in New Zealand my friends are using suppressors and we cant they are all shooting semi auto M16s and we cant. All the anit gun lobby people cite the shootings in the usa as the reason we cannot change. They are seriously phuked in the head and have no idea what they are talking about. I love my shooting for sports and just wish i could have a few more toys that would make it even more fun.

  • @RickSaffery
    @RickSaffery 6 років тому

    No vulnerability discovered in the old electronic safe. Fail-to-connect cable to main-board vulnerability detected in Dave! Thanks for making another totally enjoyable video. I really enjoy how you manipulate your scope and make it look so effortless.
    Future video tangent using this clip as springboard. Create a powerful magnetic field outside the safe. Perhaps you could replicate the solenoid action and pull that rod to clear the little locking block.

  • @XOIIOXOIIO
    @XOIIOXOIIO 9 років тому +12

    Oh god when he had that cable unhooked I thought "I really, really hope he remembers to put it back in".
    Then he forgot. *palm* oh man, I did something similar on one of those cheap safes. I knew it was coming but still, painfull lol.
    Good thing he didn't get a TDR one.

    • @Bunny99s
      @Bunny99s 4 роки тому

      Actually with the right tools he could have re-plugged the cable through the existing holes.

    • @46bovine
      @46bovine 4 роки тому

      Dumb shit he is or rather was this vid is 5 years old.

  • @furqanfarooqui
    @furqanfarooqui 9 років тому +1

    You're the best channel on UA-cam! Always brings a smile watching your videos.

  • @lincolnproctor1555
    @lincolnproctor1555 7 років тому +4

    LoL I bet there was a Schrodinger's connector moment for a bit...

  • @robertohurtado6458
    @robertohurtado6458 8 років тому +2

    "the gravity is a bitch" best phrase ever

  • @gabest4
    @gabest4 9 років тому +16

    I liked the part where Dave changed into a gynecologist.

  • @stemid85
    @stemid85 9 років тому +1

    Dear viewer, let me save you 40 minutes; he can't crack the safe with power line analysis. Very cool video and great techniques demonstrated. I really need to go to a workshop to learn how to use a fancy oscilloscope like that.

  • @piranha031091
    @piranha031091 9 років тому +3

    How about trying to remotely move the pin by moving a big neodymium magnet against the door?

    • @lordsauron2487
      @lordsauron2487 4 роки тому

      Considered a neo mag but idk where to get a large one

  • @OhSoddit
    @OhSoddit 6 років тому

    I've been watching this 90 seconds, and I'm already 100% behind you. A friend described his Sandleford EZ75 as "not worth the cardboard box it came in" after being burgled. Thieves just bashed it open.

  • @FennecTECH
    @FennecTECH 7 років тому +4

    They are pretty damn secure when you forget to plug the keypad in

  • @tybo09
    @tybo09 9 років тому

    Mounting the safe is absolutely essential. Otherwise, you've just boxed up valuable things for someone to take back to their place and break into at their leisure.
    If it's attached, they have to break into it in your house, and that's not normally a fast or quiet process. :)

  • @stonail665
    @stonail665 9 років тому +3

    These locks are breakable via RF analysis .but you need 2 hours.

    • @EEVblog
      @EEVblog  9 років тому +3

      Jetset Willy This model in particular? Got any further info on that?

    • @stonail665
      @stonail665 9 років тому +1

      Its about the body thickness(and build material) not the lock mechanism.
      One of my colleagues cracked the code in isolation room not sure of the model but the same size and same body thickness.

  • @forrest225
    @forrest225 9 років тому

    One of the cash drawers where I used to work was susceptible to bumping. A firm thump and it would open right up. Was handy for making change because the drawers would normally only open up for a transaction.

  • @Gexpgaming
    @Gexpgaming 9 років тому +29

    Bear Grills ?

    • @ivanhansgaardhansen2675
      @ivanhansgaardhansen2675 9 років тому

      GexpGaminG
      Vidste ikk' du så sådan noget!
      Btw. det der build sammen med Asus og Corsair, bliver det til noget?
      Så et Corsair 760T i bagrunden på et tidspunkt :-D

    • @ORIONGaming
      @ORIONGaming 9 років тому +1

      GexpGaminG I thought Steve Irwin lol

    • @rookiemcm77
      @rookiemcm77 9 років тому +3

      +V Singularity Three things... a sticky note reminding you not to lock yourself out...

  • @shmehfleh3115
    @shmehfleh3115 9 років тому +1

    "1,2,3,4,5? That's the stupidest combination I've ever heard! It's the kind of combination an idiot would have on his luggage!"

  • @nitrobob89
    @nitrobob89 8 років тому +8

    you have a 3d printer you could of made a tool for the job

  • @chronobot2001
    @chronobot2001 4 роки тому

    Genius !!! You took a medium security age and made it totally invulnerable to electronic attacks.
    Now the combination to get in requires a drill and metal screwdrivers.

  • @CaptmagiKono
    @CaptmagiKono 9 років тому +37

    Is there a lot of break-ins where you live?

    • @EEVblog
      @EEVblog  9 років тому +12

      CaptmagiKono No, quite rare.

    • @CaptmagiKono
      @CaptmagiKono 9 років тому

      EEVblog That is good, I would never personally need a safe like this for my junk. All of my money is with the bank, I only hope they have TDR safes with my money :P

    • @ZenerDragon
      @ZenerDragon 9 років тому +53

      CaptmagiKono It's Australia, they're too busy avoiding death from scary animals to steal from each other.

    • @EEVblog
      @EEVblog  9 років тому +19

      CaptmagiKono I don't need a security safe either. But the fire proof ones are handy for important documents etc.

    • @ninjaroo882
      @ninjaroo882 9 років тому +8

      CaptmagiKono Actually your money isn't safe at the bank. When you make a deposit you have given the bank an unsecured lone and permission to do what they will with it. Read the fine print.

  • @kararam
    @kararam 6 років тому

    there is an anti-bump mekanism next to the solenoid.
    its the brass thing with also a spring that sits "above" the solenoid.
    if you bump it so the solenoid springs away, the brass rod also spring the same direction and takes its place.

  • @crazyhans
    @crazyhans 9 років тому +13

    What about trying to pull the solenoid pin inwards by using a magnet from the outside?

    • @TheHuesSciTech
      @TheHuesSciTech 9 років тому +11

      Crazy Hans The case is steel, it would shield the magnetism.

    • @TheMrTape
      @TheMrTape 9 років тому +14

      TheHue's SciTech Steel doesn't shield magnetism... You need something like Mµ metal for that. A giant electro magnet pulsed with high current and the handle being timely turned, should work; the question is, how many amps would you have to pulse to pull that spring back? If they were really smart, the pin isn't magnetic.

    • @ho2sorellestupide
      @ho2sorellestupide 9 років тому +20

      TheMrTape the pin has to be magnetic in order to allow the solenoid to pull it in...

    • @Ts6451
      @Ts6451 9 років тому +3

      TheMrTape Mu metal isn't something special, it just have a much higher permeability than steel. Both can work as magnetic shielding by essentially conducting the field around the shielded area, the higher permeability of the mu metal means you can use thinner sheets, but for very strong fields both metals would saturate(mu metal is probably more susceptible to saturation than the steel, actually)
      Whether or not it would be possible to pull the plunger with an external magnetic field is hard to say the plunger may just stick to one of the other parts of the lock(And the lock may be designed to prevent such attacks). Either way, it probably isn't a practical attack. After all, the point is to either dissuade attacks or to make it to time consuming or expensive in resources to make it practical.

    • @FrozenHaxor
      @FrozenHaxor 9 років тому +2

      TheMrTape I would stuff it against one of those magnets they use at the junk yards to move crap around, should work a treat lol

  • @ianbutler1983
    @ianbutler1983 4 роки тому

    I was in Loss Prevention for a chain of retailers in the US. We never had a single burglary where they attempted to defeat the lock or attack the door. Always the body of the safe.

  • @glenwoofit
    @glenwoofit 9 років тому +7

    Could you not apply a voltage directly to the solenoid the same way you replaced the plug?

    • @EEVblog
      @EEVblog  9 років тому +5

      glenwoofit No, that's called spiking, and this lock is protected against that.

    • @GraydonTreude
      @GraydonTreude 9 років тому +2

      EEVblog you where able to get to the pins so you could spike the pins.

    • @TheHuesSciTech
      @TheHuesSciTech 9 років тому +10

      Graydon Treude He got to the solenoid pins after opening the safe, and then opening the lock mechanism... the safe is kinda already compromised at that point *facepalm*

    • @GraydonTreude
      @GraydonTreude 9 років тому +1

      TheHue's SciTech when he reconnected the pins from the out side he had total access to the pins from the out side

    • @TheHuesSciTech
      @TheHuesSciTech 9 років тому +18

      Graydon Treude Those were the keypad pins, not the solenoid pins. For goodness sake, he *specifically* went over this in the video, try watching the video.

  • @keriksen2749
    @keriksen2749 4 роки тому

    Old fabrication or Machining trick if you're drilling through steel or hardened steel and cast iron is to use Dawn dishwashing liquid instead of oil or cutting fluid the drill bit will last quite a bit longer love the channel man

  • @supernova86
    @supernova86 7 років тому +8

    Bob is not my uncle

  • @38911bytefree
    @38911bytefree 9 років тому

    Input rutine could just check the 6 digist at once. That is, it stores the keys you press (no matter if good ones or bad ones) and when you press the 6th one, then a comparison is done. So perhaps you get a difference at this point. But you need to input all valid 6 digits. Until the 6th, FW could just read and store and eventually time out this input and clear the code you pressed and retunr to wait state for a new set of key presses. Code path will be the same for any key (good or bad). The method is very interesting, even the thermal one. Sometimes, OBVIOUS things are overlook, that is Murphy at its best. But as you said, those guys haven been doing locks for years, and sure they they go through this issues before and patched them.

  • @Mickey-im3bg
    @Mickey-im3bg 7 років тому +9

    I wouldn't even bother breaking and I would just take the safe with me.

    • @johnwattie1786
      @johnwattie1786 7 років тому

      But, what if you run into a scenario where its bolted down?

    • @screengames5307
      @screengames5307 7 років тому +9

      +John Wattie run off with the room

    • @ktmridersforlife6861
      @ktmridersforlife6861 7 років тому

      NIGHTFOX you can mount them to the ground

    • @Drew-py8kg
      @Drew-py8kg 7 років тому

      Well now we know you're a thief

    • @VictorRivarola007
      @VictorRivarola007 7 років тому +1

      Dave... When you are designing any uc safe system that has a fixed digits... even a novice programmer would first collect all the digits and then process them.

  • @dickcheney6
    @dickcheney6 5 років тому

    If the location where the safe is also has an alarm, once it starts sounding, the burglars would probably be scrambling to just find "quick grabs" and not bother with anything they couldn't just bash open in a few seconds, assuming the safe was bolted down. Thus an alarm makes safes and even simple locked doors/cabinets within the building more useful.

  • @kunjupulla
    @kunjupulla 4 роки тому +5

    Who all are here in 2020?

  • @BoB4jjjjs
    @BoB4jjjjs 4 роки тому

    That was quite a good experiment and very funny when you locked yourself out. First time I have discovered your channel, but I'll be back.

  • @petelite
    @petelite 9 років тому +1

    Dave, this is a great video! I always enjoy your insight into the design of a system, and especially your real-time commentary when trying to hack something!

  • @leecwilkin
    @leecwilkin 6 років тому

    you're the only bloke i've ever seen trying to break out of a safe :-) it must be the convict in you :-)

  • @feynthefallen
    @feynthefallen 7 років тому

    What probably happens when you bump it is, the locking bar moving down (or backwards, however you look at it) compresses the angled sear against the solenoid pin, catching it before it can slide back into the coil housing all the way to free the sear. That is probably intentional anti-bump design too.

  • @Electricworld-1
    @Electricworld-1 5 років тому

    Hello everyone , David if you hold a powerful magnet near the solenoid it will unlock (: guaranteed to work just operate the solenoid with Neodymium magnets magnet on from outside the box. you can hear it click. a bit tricky but you have to catch it at the right angle, this is for any digital safe

  • @ExStaticBass
    @ExStaticBass 8 років тому

    That 4 khz signal your hearing is actually really close to the resonant frequency of the human ear. That's why they use that range. Because most people can hear it really well. As to your methods of cracking this bugger of a safe, I found this video really interesting.

  • @techalyzer
    @techalyzer 9 років тому

    You're so much like me. Every single thing that you can do wrong in a project you do it :))))) I actually thought you reversed battery polarity when you locked it the first time.
    But hey, this is what makes us special, being curious about stuff and asking that "what if", and more than that, actually putting that "what if" to the test to actually see the result.

  • @Metalhead-4life
    @Metalhead-4life 5 років тому

    So lucky that cable was still oriented in the same direction with the receptacle. Nice to have a digital safe with a backup key lol

  • @Sattkopf
    @Sattkopf 7 років тому

    the little pin is still the vulnerabillity
    even if that is drilling protection on the front, dave showed the walls are drillable even with an battery powered drill.
    so you can simply attack that spring from another angle. even if there is only access from the front, you drill into the bottom of the door loosen the bolts and you are in like flinn ;)