Mike Kelly

Mike Kelly

Colorado Springs, Colorado, United States
367 followers 369 connections

About

Mike is an Information Security professional with a focus on Red Team Testing, Physical…

Experience

Education

  • Intellitec College

    -

Licenses & Certifications

Publications

  • Inside the Wire - Network Attacks Against Physical Access Controls

    THOTCON 0x9

    We rely on physical defenses to protect our safety and the security of critical assets. Whether in a dedicated engagement or in the scope of a broader Red Team exercise, traditional assessments of physical security often focus on leveraging physical access to obtain network access. That methodology not only overlooks the broader impact of unauthorized physical access, but ignores the networked technologies that enable modern physical security defenses.

    In this talk we expand on that…

    We rely on physical defenses to protect our safety and the security of critical assets. Whether in a dedicated engagement or in the scope of a broader Red Team exercise, traditional assessments of physical security often focus on leveraging physical access to obtain network access. That methodology not only overlooks the broader impact of unauthorized physical access, but ignores the networked technologies that enable modern physical security defenses.

    In this talk we expand on that methodology by exploring multiple field-tested methods of leveraging basic network access to gain persistent, repeatable, and privileged physical access to critical assets and personnel. We discuss several network level attacks against physical access control systems and demonstrate two remote exploits against two common door controllers. The exploits result in the full control of device functionality, ultimately allowing for the creation physical access backdoors.

    Other authors
    See publication
  • CVE-2017-16241: Vulnerability in AMAG EN Series Door Controllers

    CVE Advisory

    A vulnerability in AMAG EN Series door controllers that allows an unauthenticated attacker to remotely, via the network, trigger door controller functionality including: locking/unlocking the door, disabling/enabling the controller, and adding new access card values to the controller's database. Addition of access card values allows an attacker to gain physical access using an illegitimate access card.

    See publication
  • eHarmony Password Dump Analysis

    SpiderLabs

    In depth analysis of eHarmony's 2012 password breach.

    See publication
  • 2012 Global Security Report - Business Password Analysis

    Trustwave

    Passwords continue to be a pertinent topic of discussion and study within both the security community and the world of technology at large. However, few studies have had the advantage of large amounts of real-world data. In this section, over 2.5 million anonymized passwords from Trustwave’s client businesses are analyzed.

    Other authors
    See publication

Projects

Recommendations received

View Mike’s full profile

  • See who you know in common
  • Get introduced
  • Contact Mike directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Mike Kelly in United States

Add new skills with these courses