logo

Phreaking Elevators

Conference:  Defcon 27

2019-08-01

Summary

The presentation discusses the topic of phreaking elevators, with a focus on elevator phones. The speaker covers the basics of elevator phones, including their history and how to use them. They also provide information on how to gather data on elevator phone systems, and how to control elevators using independent service mode. The speaker emphasizes the importance of not interfering with emergency communication systems and not hacking elevators in the wild.
  • Elevator phones can be used to acquire other phone numbers and building information
  • Phone number information is critical and can be found on the internet
  • Social engineering is a valid attack method for acquiring elevator phone numbers
  • Independent service mode can be used to control elevators
  • The speaker emphasizes the importance of not interfering with emergency communication systems and not hacking elevators in the wild
The speaker shares a story about how to control an elevator using independent service mode. They explain that once the mode is engaged, the elevator can be driven up to the top floor, and the door can be kept closed to prevent anyone from seeing or hearing the person inside. The speaker also advises pressing the door open button to escape the elevator if necessary. However, they emphasize that this should not be attempted without proper training.

Abstract

This is a comprehensive dive into the current emergency phones with an in-depth look at the phones used in elevators. This talk will provide unique insight into a topic that hasn't been covered before: Elevator Phones. During this talk, I will discuss the commonality between elevator phone brands. I will cover a new, never before released, set of default passwords these system use. I will show a tool kit and how to use it to access elevator phones locally, as well as remotely. In addition, I will show how to reprogram a phone , how to make the elevator state its location, and how to alert the passenger that help is on the way. Finally, I will demonstrate some attacks, including how you can use elevator phones as listening devices to silently listen to conversations of people inside an elevator. I’m WillC, your elevator operator, let's go for a ride!

Materials:

Tags: