"When you look at a Smart Meter, it practically winks at you. Their Optical Port calls to you. It calls to criminals as well. But how do criminals interact with it? We will show you how they look into the eye of the meter. More specifically, this presentation will show how criminals gather information from meters to do their dirty work. From quick memory acquisition techniques to more complex hardware bus sniffing, the techniques outlined in this presentation will show how authentication credentials are acquired. Finally, a method for interacting with a meter's IR port will be introduced to show that vendor specific software is not necessary to poke a meter in the eye."
Text of DefCon 2012 - Power Smart Meter Hacking
1. Looking Into The Eye Of The Meter Don C. Weber InGuardians, Inc.Copyright 2012 InGuardians, Inc. 1
2. Cutaway and InGuardianshttp://www.linkedin.com/in/cutaway http://inguardians.com/infoCopyright 2012 InGuardians, Inc. 2 3. Smart Meter Research FindingsREDACTEDCopyright 2012 InGuardians, Inc. 3 4. Research Disclaimer Yes, I conduct assessments on AMI components No, I will not tell you for which clients No, I will not tell you which vendor products I have analyzed Yes, many of these images are genericCopyright 2012 InGuardians, Inc. 4 5. Danger Electrocution I am not responsible for your actions. InGuardians, Inc. is not responsible for your actions.Random Image Taken From: http://www.flickr.com/photos/lwr/132854217/Copyright 2012 InGuardians, Inc. 5 6. Permission-based Research / Penetration Testing Unauthorized Testing Is Illegal EVEN IF THE METER IS ON YOUR HOUSE.Getting Permission For Research IS NOT IMPOSSIBLE. Contact Vendors. I am not responsible for your actions. InGuardians, Inc. is not responsible for your actions.Copyright 2012 InGuardians, Inc. 6 7. Agenda Purpose Smart Meters Criminals and Smart Meters Attack/Assessment Optical Tool Mitigations Not So Random Image Taken From: http://www.willhackforsushi.com/?p=349Copyright 2012 InGuardians, Inc.7 8. Purpose: Presentation and Toolkit Smart Meter data acquisition techniques have been known since January 5, 2009 Advanced Metering Infrastructure Attack Methodology  Some vendors/utilities/people/teams are still not aware Tools to: Test functionality Validate configuration Generate anomalous data  http://inguardians.com/pubs/AMI_Attack_Methodology.pdfCopyright 2012 InGuardians, Inc.8 9. What Criminals Can Attack Access and change data on meter Gain access to wireless communications Subvert field hardware to impact internal resourcesCopyright 2012 InGuardians, Inc. 9 10. Criminal Interest Free or Reduced EnergyHAS ALREADY Corporate Espionage OCCURRED VIA OPTICAL PORT Access To Back-End Resources Non-Kinetic Attack HacktivismCopyright 2012 InGuardians, Inc.10 11. Aggregator On PoletopRandom Image Taken From:http://www.blogcdn.com/www.engadget.com/media/2009/12/091204-smartgrid-01.jpgCopyright 2012 InGuardians, Inc. 11 12. Only One Winks At YouCopyright 2012 InGuardians, Inc. 12 13. Where To Start?Steal This? State of Texas: Class B Misdemeanor Theft - $50 to $500Jail