- Joined
- Nov 26, 2020
- Messages
- 716
A security researcher demonstrated the hacking method.
Pavel Zhovner, a security researcher, demonstrated a method for hacking some electronic safes manufactured by SentrySafe using the Flipper Zero device and exploiting a vulnerability in the controller's control protocol.
A detailed video shows the process of reverse engineering the principle of operation of a safe that uses a solenoid to lock/unlock the door locking mechanism. Data transmitted via the UART protocol from the PIN input panel to the main safe controller is intercepted.
To automate the hacking process, the CentrySafe application is used, written by the developer community specifically for the Flipper Zero device. It exploits the vulnerability and allows you to set a new PIN code, thereby opening the safe.
Pavel Zhovner, a security researcher, demonstrated a method for hacking some electronic safes manufactured by SentrySafe using the Flipper Zero device and exploiting a vulnerability in the controller's control protocol.
A detailed video shows the process of reverse engineering the principle of operation of a safe that uses a solenoid to lock/unlock the door locking mechanism. Data transmitted via the UART protocol from the PIN input panel to the main safe controller is intercepted.
To automate the hacking process, the CentrySafe application is used, written by the developer community specifically for the Flipper Zero device. It exploits the vulnerability and allows you to set a new PIN code, thereby opening the safe.