Difference between revisions of "ZigBee Sniffing"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 26: Line 26:
* Sniffed Transport Key
* Sniffed Transport Key
* Decrypted commands
* Decrypted commands
* Detailed [[File:ZigBeeSniffing.pdf]] about the ZigBee protocol and the conducted project
* Detailed [[File:ZigBeeSniffing.pdf|documentation]] about the ZigBee protocol and the conducted project


== Used Hardware ==
== Used Hardware ==

Revision as of 08:49, 7 March 2019

Summary

In this project the communication between a Raspberry Pi with a Raspbee module and a Philips Hue light bulb was sniffed with the Atmel RZ Raven USB stick. The Transport Key was obtained and therefore the on/off commands sent from the Pi to the bulb could be decrypted.

Requirements

  • Operating system of host: Windows 10
    • Software:
      • SD Card Formatter 5.0 for SD/SDHC/SDXC
      • Win32 Disk Imager
  • Operating system of attacking host: Kali Linux 64 Bit
    • Version 2018.2
  • Packages: KillerBee
  • Operating system of Raspberry Pi: RaspBee Gateway SD card image Raspbian Jessi RaspBee (Stable)
    • Version 01-2017

Authors

  • Daniel Tod
  • Luca Strobl
  • Dominik Mayer
  • Jean Castillo

Results

  • Sniffed Transport Key
  • Decrypted commands
  • Detailed File:ZigBeeSniffing.pdf about the ZigBee protocol and the conducted project

Used Hardware

  • Raspberry Pi 3 Model B+
  • SD card with at least 8 gigabyte of memory
  • Raspbee module
  • Philips Hue light bulb
  • Atmel RZ Raven USB stick
  • AVR Dragon programming board
  • IDC cable
  • USB 2.0 cable a-male to b-male
  • Windows 10 host
  • Kali Linux host
  • USB stick with at least 4 gigabyte of memory
  • USB mouse and keyboard
  • external monitor
  • HDMI cable

See the documentation for detailed information of the used hardware such as images and links.

Courses