Cybersecurity, The Deep Web and Robots (Pt 1)

Cybersecurity, The Deep Web and Robots (Pt 1)

I've been on a quest to find robots. This ambition motivated me to take a trip around Tokyo, Japan - the global hub of Robotics - to see what I could find. We tend to see alot of cool advancements and breakthroughs on the Inter-webs, but where are the real-life drones and quadrapeds roaming our urban landscape - how far are we from that reality? Amidst my disappointment for lack of finding the Robotopia I was looking for, I started watching documentaries and a new TV series aptly titled 'Mr. Robot'. Again to my dismay the show wasn't to involve any gigantic mechanical droids taking over the Earth. However, it did set me on a path delving into Cybersecurity and what is known as 'The Deep Web'.

The Mr. Robot series revolves around a cybersecurity engineer who also happens to form port of an underground hacker group 'fsociety' that seeks to take down the 'E(vil) Corp' (yes very cliche but I won't turn this into a critic review) whom control the world's financial credit. It gets very technical in the details of how they plan the attack, planting a rootkit inside one of the E Corp servers and utilizing it as a gateway to wipe out every other server in the datacenter. This attack must be coordinated in parallel with the replication server that exists in the China data centre in order to halt the corporation completely. However, to completely destroy Evil Corp they must also take down the offline backup centre, appropriately titled 'Steel Mountain'. This data centre has no network connectivity to the outside world - so how will they achieve this? Well, by hacking the HVAC system, of course!

Their plan is to physically break into the centre and splice a Raspberry Pi onto the field bus of the 'Air Dream' system, this would be remotely controlled to send a setpoint change command to all AC units and increase temperature to a level that caused all the backup tapes to melt. It's a great theory! Kudos to the writers to put the research into those technical details. Whether this would actually work in reality... I'm sure there are alot of other factors to consider; whether the AC system would really reach such a setpoint? - you would think there would be some failsafe limits, are the heaters even rated for reaching such a temperature? What protocol are the units running on? if its a field bus protocol you would need to know the device identifiers and the correct registers.

Perhaps, given the right scenario and certain type of device, this theory would certainly be plausible. But what's more important about this whole plot-point, and what really got me thinking, is that these types of exploits are now in mainstream media. Gone are the days when our first line of defense was;

" nobody even knows what the HVAC system is, let alone how to get into to it".

People are getting smarter and more well-informed, the duty falls on us to ensure that they cannot exploit the systems that we design and install. I was recently at a presentation held by M2M Connectivity discussing routers/ modems, and again the infamous Target hack was used as an example of security done wrong. People know that HVAC controls are exploitable, they use it as a case study, and it's only a matter of time before it happens again.

Moving on from the TV series, I started researching into The Deep Web, Tor networks and read some great articles posted by Fred Gordy on the use of Shodan, I'll detail my findings in the next article.

If you have the time, please check out the Mr. Robot series, it's definitely not for everyone but tech heads will enjoy it.

*p.s.* There are now tutorials popping up on the Internet, with reference to Mr Robot, showing how to setup a Raspberry Pi with Kali and a Cryptcat Listener to enable remote hacking (https://null-byte.wonderhowto.com/how-to/hacks-mr-robot-build-hacking-raspberry-pi-0163143/

Leon Wurfel

Founder of Bueno - Built Environment Optimisation

9 年

I loved Mr Robot! So much I even got a Mr Robot themed birthday present this year (a set of lockpicks haha)

NIce one Rav. I can't wait for our system to be the first one hacked :-)

要查看或添加评论,请登录

Rav Panchalingam的更多文章

  • LoRaWAN Room Monitoring

    LoRaWAN Room Monitoring

    Room condition monitoring has always been an essential component of a commercial building, and has typically fallen…

    9 条评论
  • Innovation Flagman

    Innovation Flagman

    In the United Kingdom, 1865, the Locomotive Act - otherwise known as the "Red Flag Act" - was passed. This legislation…

    2 条评论
  • Chatbots R 4 WiNz \o/

    Chatbots R 4 WiNz \o/

    "I'm sorry Dave, I'm afraid I can't do that" - the infamous line spoken in an eerily calm tone by HAL 9000. The movie…

    2 条评论
  • Bitpool + EDMI Reporting Solution

    Bitpool + EDMI Reporting Solution

    EDMI are one of the most reputable and quality brands in electrical smart meters through Australia, New Zealand and now…

    9 条评论
  • How I explain a UX role - the Rock Band analogy

    How I explain a UX role - the Rock Band analogy

    Our team recently lost a good UX/UI designer and I was forced into the arduous process of rehiring. Not only did I come…

    4 条评论
  • 101 Guide to Offshore Hiring

    101 Guide to Offshore Hiring

    "Greetings for the day! We are leading [insert generic tech guff] development firm in India with over 10,000,000…

    4 条评论
  • #NaaS (Niagara as a Service) - the hashtag buzzword we've been waiting for

    #NaaS (Niagara as a Service) - the hashtag buzzword we've been waiting for

    If you’re in cool kids club you’ll be up-to-date with all the latest tech buzzwords floating around, such as #SaaS…

    4 条评论
  • The Future is Coming.. Fast

    The Future is Coming.. Fast

    My father linked me an interesting TEDx Talk this week; Ray Kurzweil talking about the progress of innovation toward…

    4 条评论

社区洞察

其他会员也浏览了