Any lock can be broken, the theory states.

What can crackers Curious history occurred five years ago when the renowned expert on security systems, the University of Pennsylvania professor Matt Blaze decided to find out how useful can be mathematical methods in the study of things in no way connected with computers. As a model he chose ordinary mechanical locks "British" and quickly learned that virtually regardless of manufacturer such specialist locks his case could happen pockets without any problems.
MetaNews

* U Korean boxer vyrezhut bodies
* The European Court punish Ukraine
* The unprecedented accidents in Kiev. 7 people went straight to the morgue ....
* Lions. Woman raped her same home
* Sheet metal! As Donetsk recruited women for sex exploitation in Kiev!

Any lock can be broken, the theory states. Intuitive is very clear: the reason that there are no locks nevzlamyvaemyh is their very nature - once someone can enter legally, then there exists Southpaw, able to do so illegally. We must not only crack sealed on all sides by concrete bunker without windows and doors, but also benefit from the bunker is not possible.

Therefore potugi some manufacturers announce their products nevzlamyvaemoy absolutely can be attributed only to the admission of marketing.

Curious history occurred five years ago when the renowned expert on security systems, the University of Pennsylvania professor Matt Blaze decided to find out how useful can be mathematical methods in the study of things in no way connected with computers. As a model he chose ordinary mechanical locks "British" and quickly learned that virtually regardless of manufacturer such specialist locks his case could happen pockets without any problems. Heat discovered that each batch of locks, as a rule, is offering a combination of the two: one unique to each lock, and one general, for the master key - it is done in the event that the party will be purchased for a large agency, hotel or office, where the master key used cleaners and maids. So, theoretically calculated and Blaze showed how, with fingertips only one lock of this party and its key opens, it is possible for a few minutes to pick up a universal form of a master key. After he conducted a similar study on safes, producers and specialists terribly angry - still would, because he had committed "totally outrageous and irresponsible" act widely published "not be disclosed" information (of course, well-known professional medvezhatnikam).

Well, with regard to electronic devices, a multi-industry around the production of various high-tech "toys" (in English there are special to them, but not very well in Russian sounding name gadgets - "gadgets"), a general, the development of industry and trade unauthorized funds access. At the flow put hacking household DECT phones, corporate wireless networks, game console. Note that this formulation is not always illegal: the laws of some countries, including Russia, a lot permit. And one can only wonder naivety some manufacturers of protective devices, thinking that the articles of the Penal Code compensate for the weakness of those devices.

We continue to look at just a few examples to get started with road Queensland *, which, as they assure manufacturers, provide absolute protection. It would say "heroes" Privy city Vadim Panov - ага, schaz ... absolute.

Car alarms

Consider only the "normal" version of avtougona protection, which applies in reasonably high-class cars. It is available from the owner of a contactless key (card or tag in the form of boxes). After switching the ignition on the radio going on recognition: "a" or "free-rider" in the car. If the correct key is not available, the siren included (in itself - rather naive way of protection, like stuffed to the garden, because the wires cut case sirens couple of seconds), and most importantly, blocked the launch of the engine, not the only way, but usually in two or three locations. In large parts of cheaper label-key systems integrated directly into the ignition key, but this is not the best way (as a separate card, and provides protivorazboyny mode when in the absence of it is already in the cabin zavedenny shuttle engine).

To circumvent this system has a lot of ways, especially using concrete implementation, but again, we stumbled on the most advanced. First, the weakness of the system are the relays, which provide jamming the engine. In the best designs they contactless and managed digit code, which goes on general wires feeding electricity throughout the vehicle. Attackers in a car kedges special block, which is connected to the diet (for the machine does not have to happen, and the operation took about a minute) and operated by radio. For night use car block intercepts and writes in memory of all digital codes manage these relays. Then the command from the outside, he can unlock even in the absence of an engine ignition key.

Secondly, the actual realization of the idea of place-key, with a closer look has been extremely weak. Much of the chips for these immobilizers made known firm Texas Instruments, and a couple of years ago, researchers from Johns Hopkins University (USA), led by Avi Rubin famous (the letter "R" in the title of one of the most popular encryption algorithms in the world RSA) decided to test resistance These chips. It turned out that it is too expensive device designed by scientists, the method makes it possible to find the key obtuse over in about 15 minutes. Before the eyes of the professionals Texas Instruments professor stole his own car and even paid for its refueling (with his own credit card, of course), forcing a contactless chip ( "filling" chip - analogue travel to Moscow subway), which uses a similar technology immobiliser.

Results of this goes far beyond the automotive industry - the use of contactless tags grows frantic pace (including, for example, in electronic documents, means of access to space zasekrechennye, trade, etc.), but not about this question now. In response to the demonstration Rubin specialists Texas Instruments said that the technology is too complex for the use of its ordinary cracker and theft cases in a manner not know. I would advise them to study the proposal, for example, the Russian-language website Keycenter.ru, where appropriate money you can buy a universal programmer, which simply erases all information of the vehicle and allows him to produce a new set of keys.

Satellite and cable TV

Demand for services paid hacking cable or satellite TV channels will always be at altitude. This is especially true of satellite channels - for example, in Russia it is possible to take all European satellites, but, of course, got a pay French or Dutch operator of the overwhelming majority of our citizens simply do not have the physical ability - not because of the cost (it usually , is not so great), but because of the difficulties in making payments. But you still want something beyond slaughtered free advertising channels, it had to installers of satellite dishes.

In Moscow universal satellite antenna installation costs 300-500 conventional units (in the region - can be much cheaper), and you can find a bunch of companies and firmochek offering that something like "132 channel in Russian and more than 1000 foreign languages without "fee. Of course, most of them - legally available free channels.

For toll channels, but the likelihood of falling into the "free" basket depends on how they are protected.

In the simplest case is a way to protect broadcasters sinhroimpulsov suppression, it is absolutely necessary television, that he "knew" where the need to start a new line and frame. As a result, without special converter image "fails", turning into porridge and variable frames lines. This method is widely used by low-cost cable operators, and his overcoming available, generally speaking, the average qualifications of radio amateurs.

More complex systems, including satellite, using the conversion of the signal in digital form (from satellites currently still is a digital signal, which is then converted into regular form converter), and then become available sophisticated different ways of coding. For example, the coding frame line Eurocrypt transferred arbitrarily, at the reception party accumulate, and then restored as soon the whole picture. Such protection can be compared in order, as if we gave printed image on the strips and peremeshali them. Spread them on a table, it is possible to assemble coherent picture again, as in toys-pazlah. Around the middle of 1990 - x copes with the task of an ordinary personal computer, and, of course, problems with the manufacture of a special converter-cracker does not arise.

Knowing the particular national mentality, domestic broadcaster NTV + converter uses in its most complex system where the image is encrypted for real, just as is the case with mobile operators. Deciphering the same special card made available to each user. And, as in all respects a cryptographic system, the key to the cipher, recorded on the card is not installed once and for all (except those cards would be no problem could be cloned, as do travel on the subway), and changes every few hours .

Yet local craftsmen and found a way to hack the system, the truth is rather difficult to navigate. The special centralized device monitors replace keys (they transferred to the unit along with proprietary information showed), and places the keys intercepted at a special server on the Internet. Customer installed on the computer program, which receives these keys in real time and stores them in its converter. In practice, of course, the scheme did not receive special popularity (you need a permanent Internet connection, transfer can actually look through the computer only), but the principle is important!

Curiously, that, according to the broadcasters, good and bad Secure crack about an equal number of times: in every case price. If the signal cable operator district to pay 50-70 roubles per month, it is whether the fiddle, even equipment for hacking would cost pennies? But hacking method described NTV +, itself an expensive and troublesome, but it will cost 10-15 times cheaper than buying a package of services official.

Mobile communications

A very popular at the dawn of mobile communications method of hacking cloning tubes now descended to nothing - in the system itself GSM phone is only a means of signaling, and the cloning of SIM cards (which in itself is a very difficult task, as a means of protection against cloning specifically foreseen in the design standard), through which the subscriber authentication, easily harvested operator communications. Therefore, free cell phones you really do not find - if you are a man of such offers, it almost stoprotsentnoy likely it is a scam.

The other case - listen. At various times, enthusiasts are different ways of circumventing the protection of GSM, including quite funny. For example, even before the American invasion of Iraq, when it acted against the economic sanctions that have been prohibited from selling to the country myself with the encoding equipment, and the Iraqi mobiles used no secure communications protocol. Cracker was enough to create a false base station through which to phone then it was sent a signal that he is in Iraq, then turned and all cryptographic negotiations went through this station for the open channel.

But there are not so exotic, but it is universal, and even openly described in the academic sources ways of hacking GSM. Attention to the protocol clear: more than 80% of PCs, the number of owners in the world which has exceeded 2.5 billion in the previous year, use GSM. Investigation of resistance GSM protocols have started in the second half of 1990 - and fairly quickly discovered weakness.

It's no secret that the secret services of different countries are "backdoors" to listen to conversations - we have, for example, "such moves" actually legalized decree "On the system operational search activities" SORM-2. But not all countries have introduced such open defiance of civil liberties, and the special services have to prevaricate. And so, when the end of the "Cold War" decisions about the means of encryption mobile communication between the special services of different countries that were part of the NATO issue. On the one hand, negotiations have been protected by listening prey (as advocated by then Communist bloc countries) on the other - left loopholes for "their". Perhaps because the Warsaw Pact while breathing in the incense has won supporters loopholes, and it was a compromise solution, which greatly weakened the ability encryption scheme, originally rooted in the standard.

The result was as follows: In 1998 a group of computer experts from California, worked with the support of Microsoft, for the first time managed to clone GSM-phone. Then they needed to do so fairly powerful computer, but, first, PC power has since risen strongly, second, and the researchers were not in place. In 2003, Israeli scientists from the Institute and the University of Jerusalem TECHNION published work, which in some detail reviewed the ways of hacking GSM (paying special attention to low-budget - accessible to individuals or structures), and proved that under existing standards to protect themselves by listening almost unreal. Is that pull the battery.

In 2006, the full version was published this work (in the first version, it has been reduced by agreement with the various entities). But long before this on the Russian black market emerged software for listening GSM. According to rumours, in Moscow it is now around $ 200 thousand - the price is not for everyone, of course, but who wanted, he buys.

* Protect (to protect), a car-theft by blocking the ignition, starter, fuel, but did not attempt to prevent the invasion of the car. Sometimes alarms "calm" Thief, "" allowing him to travel some distance and then blocked car.

mobilephones