“Mike did some excellent research and contributions for SecurityAegis.com. I'm not surprised at all he works with one of the best pentest teams in the world now. Expect nothing but hard work and good things from Mike in the future.”
Mike Kelly
Colorado Springs, Colorado, United States
367 followers
369 connections
About
Mike is an Information Security professional with a focus on Red Team Testing, Physical…
Experience
Education
-
Intellitec College
-
Licenses & Certifications
Publications
-
Inside the Wire - Network Attacks Against Physical Access Controls
THOTCON 0x9
We rely on physical defenses to protect our safety and the security of critical assets. Whether in a dedicated engagement or in the scope of a broader Red Team exercise, traditional assessments of physical security often focus on leveraging physical access to obtain network access. That methodology not only overlooks the broader impact of unauthorized physical access, but ignores the networked technologies that enable modern physical security defenses.
In this talk we expand on that…We rely on physical defenses to protect our safety and the security of critical assets. Whether in a dedicated engagement or in the scope of a broader Red Team exercise, traditional assessments of physical security often focus on leveraging physical access to obtain network access. That methodology not only overlooks the broader impact of unauthorized physical access, but ignores the networked technologies that enable modern physical security defenses.
In this talk we expand on that methodology by exploring multiple field-tested methods of leveraging basic network access to gain persistent, repeatable, and privileged physical access to critical assets and personnel. We discuss several network level attacks against physical access control systems and demonstrate two remote exploits against two common door controllers. The exploits result in the full control of device functionality, ultimately allowing for the creation physical access backdoors.Other authorsSee publication -
CVE-2017-16241: Vulnerability in AMAG EN Series Door Controllers
CVE Advisory
A vulnerability in AMAG EN Series door controllers that allows an unauthenticated attacker to remotely, via the network, trigger door controller functionality including: locking/unlocking the door, disabling/enabling the controller, and adding new access card values to the controller's database. Addition of access card values allows an attacker to gain physical access using an illegitimate access card.
-
eHarmony Password Dump Analysis
SpiderLabs
In depth analysis of eHarmony's 2012 password breach.
-
2012 Global Security Report - Business Password Analysis
Trustwave
Passwords continue to be a pertinent topic of discussion and study within both the security community and the world of technology at large. However, few studies have had the advantage of large amounts of real-world data. In this section, over 2.5 million anonymized passwords from Trustwave’s client businesses are analyzed.
Other authorsSee publication
Projects
-
Concierge Toolkit
The Concierge Toolkit is collection of various scripts and resources to aid the in identification and exploitation of physical access control and monitoring systems.
-
Wiegotcha - Long Range RFID Thief
RPi 3 based portable Long Range RFID Reader (inspired by the Tastic RFID Thief)
Recommendations received
1 person has recommended Mike
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Mike Kelly in United States
4766 others named Mike Kelly in United States are on LinkedIn
See others named Mike Kelly