How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?


Monday, June 23, 2014

Survive Hacking at PHDays. Cyber Threats of a Common Apartment

Items and devices we use are becoming more and more convenient. Today, we have internet connection in our cars and even in certain kinds of microwaves and fridges. According to Gartner, there will be more than 26 billion intelligent home appliances while the market size will grow to 300 billion dollars by 2020.

However, few people realize that common computers with access to the internet and gadgets that make up the so-called internet of things are vulnerable to attacks. PHDays organizers created a model of a real apartment equipped with various electrical appliances and a smart home system in order to demonstrate the possible consequences of hackers' attacks. Due to an error, all devices of the apartment has gone insane and turned out to be a trial for the owner. Participants of the contest needed to release him.

The smart home appliances are controlled by a controller. The controller regulated lighting and water systems, TV, a vacuum cleaner and other appliances.

When getting inside, anyone should go through an identification process. Height and weight of a person were measured by various sensors. There also was a palm recognition system installed in the system.

After completing the identification process, the system unlocked a control HMI. Contestants could get access to the HMI using a tablet left in the apartment. But a contestant needed to unlock it first. There was a defect in Android's Face Unlock technology: it can be bypassed by bringing the owner's photo to the tablet's camera (there was one on the wall). A participant could also unlock the tablet by beating artificial intelligence at a chess game.

Each task had alternative solving methods that involved detection and exploitation of vulnerabilities in the system. "Undocumented features", which allowed bypassing the logical operation of the devices, originated from the incorrect implementation of interaction in a client-server application. But unfortunately, only a few participants used their hacking skills.

To win, a contestant needed to solve all tasks and to gain control over the smart home system faster than competitors. A participant with the nickname Cryden became the winner with a time of 6 minutes and 3 seconds.

The Survive Hacking contest is the continuation of the last year's Labyrinth competition that took place at Positive Hack Days III. During this competition, participants needed to clear obstacles—rooms with laser field, motion detectors etc.


  1. Good Security systems help clients in every aspect of their life even while they are on the move. Everyone would want to control their home systems in a competent manner.

  2. This comment has been removed by the author.

  3. It's very important to be honest in competition like this. You can face with critics and you will be disappointed then. The best way to avoid it, is to write critical essays and train, this link is a good way to do this.

  4. Programming Assignment help
    If you are still in a dilemma, you could ask your teacher for some guidance, or you can take Assignment helpfrom different assignment writing service providers. There you can find many online experts, who are all set to help you in your assignment. The proper outline followed by them will give you an idea of how to make your assignment look more presentable and attractive.