Jump to content
Security Installer Community

Hi-Res Picture Of Csl Dualcom Unit


Recommended Posts

http://blogs.computerworld.com/18776/mobile_phone_eavesdropping_made_easy_hackers_crack_gprs_encryption

 

Maybe there is something else on top, i don't know, but there must be another level of DualCom encryption, i would imagine linked to the Gemini servers?

Interestingly the connection from arc to Gemini relies totally on an IPSec von with a static key to encrypt the data. I found it a bit poor they require a VPN to the arcs network to provide a secure link and with a static key, I'd argue it wasn't immensely secure.

www.securitywarehouse.co.uk/catalog/

Link to comment
Share on other sites

I guess this is going to be one of the issues with CSL Dualcom - because of the centralised Gemini platform, I'm not going to be able to look at a device in operation properly. I can probably spoof a server to respond in the way it expects.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Link to comment
Share on other sites

I guess this is going to be one of the issues with CSL Dualcom - because of the centralised Gemini platform, I'm not going to be able to look at a device in operation properly. I can probably spoof a server to respond in the way it expects.

Someone could send you a live production unit

www.securitywarehouse.co.uk/catalog/

Link to comment
Share on other sites

Wouldn't CSL Dualcom have a fit if they knew that tampered with hardware was being connected to their network?

 

To start with I'm probably just going to change the interface to the M2M module so it connects to something I have control over, should be able to see a lot.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Link to comment
Share on other sites

Wouldn't CSL Dualcom have a fit if they knew that tampered with hardware was being connected to their network?

 

To start with I'm probably just going to change the interface to the M2M module so it connects to something I have control over, should be able to see a lot.

That's an interesting question. The way I see it is if I have a production unit that I am paying for, is it any of dualcoms business if i monitor traffic on it? On my webway I do it all the time.

I had a similar discussion with Chiron. As I have access to all by databases I was very surprised when Chiron announced that I aren't allowed to see the data in my SQL database on my server on my network that iris uses. You seem to get a huge variety of responses to seeing under the hood depending on who the vendor is.

www.securitywarehouse.co.uk/catalog/

Link to comment
Share on other sites

I'm not sure, I guess it depends on the contract. Not even sure if you actually really "own" the unit as such?

 

What happens if there is a hole like in SIA-HS where you can masquerade as any other customer? Then it might cause real problems. They could interpret it as hacking as well.

 

No response from the email though, so not anyway of knowing for sure.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.