CatSniffer Distributed Zibee

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ส.ค. 2024
  • This video shows how, using CatSniffer and Wireshark, we can perform a sniffing of the ZigBee protocol. When the LED turns on, the application profile, which in this case corresponds to Home Assistant (0x0104), sends a command using ZCL (ZigBee Cluster Library) that points to an endpoint and a cluster. In this cluster, a Boolean value is sent to turn the LED on or off.
    From Wireshark, we can visualize the whole communication process between the application and the card. When sniffing a distributed network, we discover that the end devices send the network key in connection packets. If a reboot occurs or a device re-authenticates, it will send us this key, which allows us to perform different attack vectors, such as a Man-In-The-Middle (MITM), where we visualize the traffic and observe the behavior of the devices.
    Another attack we can perform is to place a device with a ZigBee CLI that allows us to create a network. In this network, we can wait for the devices to connect. By forcing a reboot on the device, it will start searching for available connections. If we can get this device to connect to our CLI, we will have control over it and, being on a distributed network, our device will be able to access the device without interrupting the communication between Home Assistant and the end device.
    In this case, the end device connects to our client
    Visit the Electronic Cats shop online - www.electronic...
    -----------------------------------------
    Subscribe to ElectronicCats on TH-cam: bit.ly/electro...
    👉Twitter: bit.ly/electro...
    👉Facebook: bit.ly/electro...
    👉Instagram: bit.ly/electro...

ความคิดเห็น • 1

  • @fe8769
    @fe8769 5 หลายเดือนก่อน

    where is the tutorial to do this ? What is the firmware ? what is the linux part ?