How Secure Is Your Stuff in Electronic Lockers?
Course
Security researcher Dennis Giese exposes critical vulnerabilities in Digilog electronic locks, demonstrating rapid PIN extraction and master key cloning techniques that threaten shared-space security systems.
Electronic locks have become ubiquitous in shared spaces, with major companies like Amazon, Marriott and universities relying on them to secure personal belongings and sensitive materials. While manufacturers tout their security features, recent analysis of Digilog's widely deployed electronic locks reveals concerning vulnerabilities that could allow attackers to bypass these systems without leaving evidence of tampering.
The research exposes critical weaknesses in both hardware and firmware implementations, where simple debugging interfaces and side-channel attacks can be exploited to extract PINs and master key information. Most concerning is the fact these attacks can be executed within minutes using affordable tools, potentially compromising entire facilities through access to a single lock.
Given the widespread deployment of these systems and users' tendency to reuse PINs across multiple services, it's crucial for security professionals to understand these vulnerabilities and their implications for both personal and enterprise security.
This session, led by Security Researcher Dennis Giese, will cover:
- Analysis of hardware vulnerabilities in popular electronic locker systems
- Practical demonstration of firmware extraction and PIN recovery techniques
- Methods for cloning master keys and bypassing audit controls
- Recommendations for securing shared-space access control systems
Here is the course outline:
Open Sesame - Or How Secure Is Your Stuff in Electronic Lockers |