Reverse Engineering – Unlocking the Locks

Presented at HOPE X (2014), July 19, 2014, 6 p.m. (60 minutes)

If you can't tear it apart, drive it, or modify it, do you really own it? This talk seeks to free a Kwikset PowerBolt and show you how to reverse engineer and take back control of your life. The Kwikset PowerBolt lock has support for a Z-Wave module. You will learn how to diagram the function of all the ICs on the Z-Wave daughter board and the Kwikset main board, how the interfaces are used across the board, how the components are connected to each other, how to spy on the traffic, and finally how to replace the Z-Wave module with your own daughter board created in gEDA. This knowledge will give you the freedom to lock and unlock your front door in any way you can imagine. This talk will teach you how to use a multimeter to test for continuity and voltage, a bus pirate to quickly test protocols, logic analyzer tools to sniff traffic on the board, and other electrical tools. You will learn how to diagram a system at the flow chart and schematic level and best practices on how to learn a system.


Presenters:

  • Matthew O'Gorman / mog as Matthew O'Gorman aka mog
    Matthew O'Gorman aka mog is a free software advocate, having contributed to several projects: Asterisk, Erlang, ejabberd, Emacs, PAM, gEDA, etc. He is a free hardware enthusiast who started his own company (Meat Stand) and is a long standing board member of Makers Local 256, a hacker space in Huntsville, Alabama.

Links:

Similar Presentations: