CONFIRMED Smart Meter Attack

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 94

  • @mikeselectricstuff
    @mikeselectricstuff 2 года назад +37

    A lot of the ringing you're seeing on the scope will be due to using the ground flylead on the scope probe - for this sort of work you really need to use an ultra-short (

    • @RECESSIM
      @RECESSIM  2 года назад +4

      Thanks Mike, appreciate the suggestion! I have those short spring ground connectors for the scope. I’ll test that out to see how it looks. I was curious about the ringing but more concerned about the capacitor decay time so didn’t chase it.

    • @liam3284
      @liam3284 Год назад

      With enough di/dt it becomes near impossible to avoid without differential probes.

  • @JuliansRandomProject
    @JuliansRandomProject 2 года назад +15

    Really enjoying this series! Keep it up.

    • @RECESSIM
      @RECESSIM  2 года назад

      Glad you enjoy it!

  • @JourneysADRIFT
    @JourneysADRIFT 2 года назад +3

    Amazing work. Been following for a while but am eager at how close you're getting.

    • @RECESSIM
      @RECESSIM  2 года назад

      I'm eager too! Will see what I can figure out this weekend.

  • @mjmeans7983
    @mjmeans7983 Год назад +2

    One security protection against voltage glitch attacks is by manufacturing a void in only some of the layers of the PCB under the chip with a Schmitt trigger like circuit in it to provide hysteresis to the power to prevent an undervoltage condition; power only gets to the pin if it is high enough and is cut off completely when it drops. You then have to unsolder the pin in order to perform the glitch, making it impossible to glitch in the field when under a time constraint. This is particularly difficult if the chip is a BGA (many have a central area without pins) where you cannot access the power pin directly and have to unsolder the entire chip.

  • @JAYG6390
    @JAYG6390 2 года назад +3

    Nice bling! A JTAG connection would be amazing :)

  • @tisme1105
    @tisme1105 2 года назад +3

    Will be interesting to take a look at the bootloader once the factory flash contents is dumped.
    Though it might be encrypted, so you'll need to dump it from memory after boot if so.

    • @RECESSIM
      @RECESSIM  2 года назад +1

      Definitely want to get the boot loader!

  • @RedlineAndGrind
    @RedlineAndGrind 2 года назад +1

    Love watching the work go into this, well done keep it up!

  • @iwontlagback7236
    @iwontlagback7236 2 года назад +2

    Dude I love these videos so much !! Great and easy to understand videos. Just wish they weren't spaced out so much

    • @RECESSIM
      @RECESSIM  2 года назад +2

      I’m trying to balance crippling perfectionism with increased frequency of posting. 😀 Glad you enjoy them!

  • @BuyitFixit
    @BuyitFixit 2 года назад +1

    Interesting Stuff! I've reverse engineered / repurposed some stuff myself in the past, but I'm mainly doing youtube video's on fixing electronic stuff these days.

    • @RECESSIM
      @RECESSIM  2 года назад

      It’s all related I feel, getting better at any aspect helps with the others. And it’s just fun and fulfilling figuring out how something works and then fixing it!

    • @BuyitFixit
      @BuyitFixit 2 года назад

      @@RECESSIM Totally agree. I used to love figuring out how things work. Those smart meters are a bit sinister how they can remotely disconnect. I wonder if people will create firmware so they are not as accurate at measuring in the usage in future..

    • @RECESSIM
      @RECESSIM  2 года назад +1

      @@BuyitFixit The world is a crazy place, who knows what creative things might come about… 😀

  • @darcylockhart
    @darcylockhart 4 месяца назад

    Sweet. Thanks for taking the time to do this. Can’t believe you don’t have more likes

  • @ferrumignis
    @ferrumignis 2 года назад +5

    I understand how glitching the processor during the serial I/O operation could reset a pointer and start it dumping program memory, but the I/O function is almost certainly looking for a null to terminate transmission and the program memory is certainly going to have a good number of zero bytes in it, so won't it stop prematurely?

    • @RECESSIM
      @RECESSIM  2 года назад +1

      That’s what I would have assumed to, but it must be causing a different issue because it’ll loop through the ENTIRE flash multiple times.

    • @ferrumignis
      @ferrumignis 2 года назад

      @@RECESSIM I was assuming the application code was written in C, but perhaps not? Since it's a high reliability/security application it may be something like Ada that uses a length word instead of null termination.

    • @ferrumignis
      @ferrumignis 2 года назад

      @Arpad Toth printf is able to print numbers in hex using the %X or %x format string.

    • @gunderd
      @gunderd 2 года назад

      It might be that the glitch is not resetting a value to zero, but perhaps all 1's instead, and if the value that got reset happened to be a "remaining count" value = eg. in code like: while (to_do > 0) { count=print_character(buf); buf+=count; todo-=count } - like what happens in _IO_new_file_write - then perhaps the glitch could result the observed behaviour?. It's really interesting watching the process of discovery here, and I'm impressed at the dedication shown to the cause!

    • @RECESSIM
      @RECESSIM  2 года назад +2

      @@gunderd It's beyond obsession at this point, like chasing my holy grail! :)

  • @gammaleader96
    @gammaleader96 2 года назад +4

    very nice progress.
    I guess the difference in wire length can also be viewed as an impedance mismatch between the chip whisperer output and the node you pull down, if they were matched the longer cables should mostly add delay but should not change the pulse shape.
    A little offtopic but I really like your "oscilloscope probe tip" like extensions for your power supply wires, they seem like a useful thing to have.
    Looking forward to see what comes next.
    Are the pulse parameters a "universal constant" for this type of meter or do you need to tweak it for each unit?
    Since most capacitors have like +-20% tolerance, which will alter the pulse shape, I would imagine, that you have to slightly tweak them each time.

  • @philmcguire7346
    @philmcguire7346 2 года назад +1

    when you finally get this done your smart meter will be an antique! I enjoy watching though 8-)

    • @RECESSIM
      @RECESSIM  2 года назад

      The greatest gift they can give me is a new one to hack!

    • @philmcguire7346
      @philmcguire7346 2 года назад +1

      @@RECESSIM If they connect wirelessly could they not just patch the firmware, they could be checking the firmware is authentic on a regular basis for all you know? microsoft did this with xbox360 - they patched the drive firmware with an update through either a game disk or online update, it did not stop the hackers "c4eva" as he already had a silver bullet for microsoft but just hope you are aware that this could be the case? HACKING IS NOT A CRIME 8-)

    • @philmcguire7346
      @philmcguire7346 2 года назад

      would it not be easier to hack fobs? here in england we have fobs for the poor where they go to a shop and pay for their fob to be updated with x amount of gas or electricity for a price, ive often wondered if you could somehow spoof data on the fobs to get free energy, gas?

  • @juliet0001
    @juliet0001 2 года назад +3

    love these videos

  • @Mentos3D
    @Mentos3D 2 года назад +3

    This is insanely interesting!
    Trying to glitch the processor when it is initializing the JTAG lockdown should be worth a try. Automating the check as you did with the serial output should be possible.
    Would it help to increase the diameter of the glitch cable so that It can drain the internal capacitors faster / more precise?

    • @RECESSIM
      @RECESSIM  2 года назад +2

      I am excited to give that a try, if JTAG could be unlocked with a glitch it would be quite a find!
      Generally outside of decreasing wire length, or increasing wire gauge people just remove the decoupling caps on the target board which has the same effect. Could make the processor a little less stable though, I was trying to avoid any other mods to the meter.

  • @alexandergreenfield91
    @alexandergreenfield91 Год назад

    Fantastic work, skills like yours are so very valuable to the human race. It would be fabulous to see you break down and reveal the internals and preferably firmware of a UK smart meter.

    • @RECESSIM
      @RECESSIM  Год назад +1

      🙏 Any specific make/model of meter?

    • @alexandergreenfield91
      @alexandergreenfield91 Год назад

      @@RECESSIM British gas is probably the most prolific in the UK ATM. So that would be great but genuinely not sure how similar different meters here are at this stage. Thank you.

  • @mattanimation
    @mattanimation 2 года назад +4

    I live my life 100 nanoseconds at a time

    • @RECESSIM
      @RECESSIM  2 года назад +1

      Time on the grid moves at a much faster pace...

  • @danymogh
    @danymogh Год назад

    This is underrated channel❤

  • @vasquezitosanchezito
    @vasquezitosanchezito Год назад

    Amazing work!

  • @kencabanaw4165
    @kencabanaw4165 Год назад

    RUclips recommended this video. After watching a couple videos in this series, I wonder if the "energy bridge" utility companies provide consumers to read their own meter with, would more easily give up it's secrets. mine apparently uses z wave networking. I had to "pair" the device to my meter. I wonder if the pairing process is vulnerable?

  • @MacGuffin1
    @MacGuffin1 Год назад

    So exciting! Reminds me of early 360 days...

  • @Josh.Davidson
    @Josh.Davidson 2 года назад

    Awesome video and great work!

    • @RECESSIM
      @RECESSIM  2 года назад

      Thanks for watching!

  • @burlypenguin
    @burlypenguin 2 года назад +3

    Anyone want to start a pool if an exploit can be found to disconnect power? Battle Star taught me a great lesson. If you want to secure something don't put it on a network. If you can do it remotely, so can an attacker.

    • @TradieTrev
      @TradieTrev 2 года назад +3

      There's a 78 page document DEN 0083 from ARM that actually explains their device are susceptible to glitches ;)

    • @RECESSIM
      @RECESSIM  2 года назад +2

      @@TradieTrev This right here is why making videos and getting comments is AWESOME! Looks like I have my weekend reading lined up 😈

    • @RECESSIM
      @RECESSIM  2 года назад

      Indeed, only a matter of time. 15 years is a LONG time to expect a device to remain secure

    • @TradieTrev
      @TradieTrev 2 года назад +2

      @@RECESSIM "TBSA-M does not address laboratory attacks in which devices are unpackaged and probed, or power analysis
      attacks in which the power consumption of the device is correlated with its processing activity to extract assets." That's your juicy bit, have fun mate!

  • @joshuavillwo
    @joshuavillwo Год назад +1

    What movie is featured at 3:10? I like all your other taste in movies, but don't recognize that one, even though you've used it multiple times.

    • @RECESSIM
      @RECESSIM  Год назад +1

      Short Circuit, 1980’s movie that arguably had the biggest influence on my interest in electronics and robotics.

    • @joshuavillwo
      @joshuavillwo Год назад

      @@RECESSIMoh really? I actually had that on my watch list, but assumed it was just a generic robot movie like Wall-E or something.
      In that case, I will definitely move it to the top of my list.

  • @freelancer917
    @freelancer917 2 года назад +1

    The slight variation in uC startup time after reset might be an oscillator or PLL waiting to lock?

    • @RECESSIM
      @RECESSIM  2 года назад +1

      That’s what I’m thinking too, it’s something that’s settling and can vary slightly each time

    • @freelancer917
      @freelancer917 2 года назад

      @@RECESSIM If the bootloader does an external memory access or sets any I/O pins, you could probably trigger off that. Assuming you want to glitch the transition after the bootloader has finished. Should be more deterministic than timing from reset.

  • @ZeddZeeee
    @ZeddZeeee Год назад +1

    all these videos are really cool mix of reverse engineering the jokes and the smart metres combined, this is jokes and love every video, even the new ones that are hacking related, the the reverse engineering and exploitation are really neat. Cool to think about how things are made to work and how to make them work in different way that is better for you :)

    • @RECESSIM
      @RECESSIM  Год назад

      Thanks for commenting! Glad you enjoy them. 😁

  • @43ann
    @43ann 2 года назад +3

    This is super interesting, too bad I don't understand anything :-)

    • @RECESSIM
      @RECESSIM  2 года назад +3

      @BitBangBytes on TikTok if you want to ask any questions. I’ll reply with short off the cuff videos. Easier than higher production quality for RUclips.
      Could also try RUclips Shorts if anyone finds those a good way to post cell phone vids for increased updates.

  • @poddmo
    @poddmo 2 года назад +2

    What is the movie clip shown at 3:04 ?

    • @RECESSIM
      @RECESSIM  2 года назад +3

      Short Circuit - 80’s Robot movie

    • @poddmo
      @poddmo 2 года назад +1

      @@RECESSIM Ahh, thank you. Number Five is alive! :)

  • @ahndeux
    @ahndeux Год назад +1

    That 1uF capacitor may be too large a value for your setup. Try a 100pf capacitor first.

  • @CarloRoosen
    @CarloRoosen 2 года назад +1

    So you actually do have the firmware now? Also, how can a puts() command print the entire firmware, I would expect it to stop once it finds a null character??

    • @RECESSIM
      @RECESSIM  2 года назад

      I am very close, not sure why the puts() doesn’t stop at a null when I glitch it, but it will loop through the entire flash multiple times. I let it run for an hour once and it seemed to end up in a tighter loop but still printing!

    • @CarloRoosen
      @CarloRoosen 2 года назад +1

      How did you know something like this could happen in the first place? You went looking for it and then it happened, I don't understand how this is possible without a full understanding of the mechanism. Normally when you insert randomness in a running computer program it will just crash.

    • @RECESSIM
      @RECESSIM  2 года назад

      @@CarloRoosen I have seen other attacks and read that you can insert some well controlled “randomness” and cause issues that don’t quite cause a crash, but cause unexpected things to happen. I experimented with this technique using a development board that uses the same processor and then moved on to the actual hardware I want to attack. Nothing is ever what people tell you it is… :)

    • @CarloRoosen
      @CarloRoosen 2 года назад

      @@RECESSIM Yes clear, I think I understand how you got to this point. The question remains, how is it even possible? After the glitch the processor is operating on its own. So there must be a state (registers & memory) in which useful things can happen not intended by the programmer. To me that is incredibly difficult to grasp. Like the monkeys typing Shakespeare thing. Anyway, I am looking forward to the next step.

    • @CarloRoosen
      @CarloRoosen 2 года назад +1

      Also, you should have more viewers ;)

  • @TheMistysFavs
    @TheMistysFavs 2 года назад

    WHAT IF a neighbor has weaponized your smart meter and the EC WONT listen and it is being used against you with MUCH pain in my head? it was changed by some guy in Feb with NO knowledge of the EC...PLS HELP???

  • @boceephus6374
    @boceephus6374 2 года назад

    Once you get it hacked, will you be doing any tests on the wireless capability of the meter? I would like to know if theres a way to shut the wireless off completely.

    • @RECESSIM
      @RECESSIM  2 года назад +2

      I’m hopeful that getting a copy of the firmware will answer questions like how the meters can be accessed remotely, how power can be turned on/off and how they could be disabled entirely.

  • @MinePossu
    @MinePossu Год назад +1

    Don't give up

  • @king_jacob732yt4
    @king_jacob732yt4 Год назад

    they gonna be scared as hell

  • @tammiehinegardner9877
    @tammiehinegardner9877 2 года назад +1

    Had my smart meter removed.

    • @RECESSIM
      @RECESSIM  2 года назад

      They make you pay extra per month?

    • @tammiehinegardner9877
      @tammiehinegardner9877 2 года назад +1

      @@RECESSIM 5 dollars a month...well worth it I think...it was on the wall where my bed was...I swear it was making me sick....tinnitus, cramps, and other minor things.

    • @RECESSIM
      @RECESSIM  2 года назад +1

      $5 for peace of mind is well worth it

  • @GrifFungin
    @GrifFungin 2 года назад +1

    ✌🏻

  • @carfro8ify
    @carfro8ify Год назад

    So in other words, smart meters are no good?

  • @kc0eks
    @kc0eks 2 года назад +1

    Can't wait til an exploit is eventually found for millions of meters. Could be a wild time. Huge bills, no bills, no power... Weee

  • @Test7017
    @Test7017 2 года назад

    ☠️☠️☠️😭☠️😭🤣👍

  • @Test7017
    @Test7017 2 года назад

    😜😜😜💦👍

  • @393boss
    @393boss Год назад +1

    I got Tinnitus from being too close to my smart meter

    • @champstar9669
      @champstar9669 Месяц назад

      I really wish there was more info about the public health concerns relating to Smart meters.