Questions tagged [tampering]

Tampering refers to the unauthorized access or modification of a good or device. Use this tag for question regarding the process of tampering, the protection against tampering, or the detection thereof.

Tampering is the process of accessing or modifying goods or devices without authorization to do so. An example of tampering is opening a container to modify its contents, or a consumer electronic device in order to introduce aftermarket modifications.

Tamper Evident Devices

Certain devices or measures can be used to detect tampering. While these do not prevent the attacker from tampering with the device, they indicate to the person inspecting the Tamper Evident Device that tampering has occurred.

How this inspection is performed depends on the device being used, and the time and effort being put into the inspection. A casual inspection may only check if a seal is present or not, while an in-depth forensic inspection will go to great lengths to detect any signs of possible tampering

Examples of Tamper Evident Devices

  • Stickers
  • Zip-Ties
  • Crimps
  • Wraps
  • Seals (Plastic, Metal, etc.)
  • Electrical Sensors

Tamper Resistant Devices

Tamper Resistant Devices are devices that actively deter an attacker from tampering with a device. Tamper Resistant Devices do not necessarily need to be Tamper Evident Devices at the same time. An example for such a situation is a tamper-resistant slotted screw, which is a specific kind of screw that is easy to tighten with a regular slotted screwdriver, but hard to unscrew. The reason why this screw is not considered Tamper Evident is because the screw can be drilled into and removed, then replaced by an identical screw.

Examples of Tamper Resistant Devices

  • Unusual Screws
  • Locks
  • Electronic Modules

Tamper-Proof Devices

A device claiming to be tamper proof claims that it is impossible to tamper with. This belief is generally considered marketing speak. Every device sold as "tamper proof" is either Tamper Evident and/or Tamper Resistant at best. At worst, it is trivially bypassable.

53 questions
1
vote
3 answers

Detect message tampering without shared key and without certificate authority

Is it possible to detect if a message has been tampered with, without using MAC (i.e. shared key) and without using a "trusted" third party (i.e. certificate authority)? I'm pretty sure it's not, but I would just like to be sure. Note: I don't care…
Matt
  • 11
  • 1
1
vote
1 answer

How secure is Heads for detecting tampering or infection of firmware or boot sector? (Pureboot)

I'm thinking of getting a Librem laptop with Pureboot which uses Heads (with the Librem key) for tamper detection. But I've heard rumours that there are weaknesses or vulnerabilities so I wanted to see if anyone here knows about it. For me, I'm…
yannis
  • 11
  • 1
1
vote
2 answers

Does the WP(Write Protect) pin of a USB flash memory controller prevent tampering with its firmware?

Does WP(Write Protect) pin of a USB flash memory controller prevent tampering with its firmware? I want to have an USB stick that I can make it read-only and insert it in any untrusted PC without risking a silent BadUSB infection. I was thinking…
learner
  • 11
  • 1
1
vote
1 answer

Does TLS (Transport Layer Security) protect against deliberate tampering or accidental corruption?

If someone tampers with data being transmitted over HTTPS using TLS, would that result in a corrupted decrypted message or would it result in the error being detected such as through a cryptographic checksum and retransmitted? This has security…
g491
  • 143
  • 1
  • 4
1
vote
0 answers

Is multiplying hashes a valid way to ensure two sets of data are identical (but in arbitrary order)

Let's say "User A" has a set of data like below. Each entry has been hashed (sha256) to ensure integrity within a single entry. You can't modify data of a single entry without also modifying the corresponding hash: [ { data: "000000", hash:…
yaku
  • 156
  • 4
1
vote
1 answer

Protection against tampering

Recently, I have downloaded a game from Steam. I wondered whether it was somehow possible to alter the data of the game and replace it with malware without the computer it was sent to noticing. Basically, is it likely that I became a victim of a…
DaddyMike
  • 45
  • 2
  • 5
1
vote
2 answers

How to protect external hard drive from tampering?

I am looking to buy an external 1TB hard drive to store sensitive information on. External hard drives aren't (physically) small, and it may have to be left unattended at times. What can I do to increase the hard drive security so that if any…
Nen
  • 11
  • 1
1
vote
0 answers

Log tampering - edit notifications

Hello Guys I am looking for a solution that can record the log tamper event and notify(email/sms) what the change made in the log file and it should be limit to specific paragraph instead of listing complete file and highlighting the changes.
Rpendela
  • 11
  • 1
1
vote
1 answer

Android tamper resistance: BuildConfig.DEBUG spoofing?

Our team is trying to secure a native Android mobile app. Amongst other things we are using Dexguard for some checks such as tamper, root and emulator detection. Long story short: some of these checks fail in our debug builds - mainly because we…
fgysin
  • 715
  • 1
  • 9
  • 13
1
vote
1 answer

What recommended precautions should one take when using internet provided by a Landlord?

I am curious about what necessary steps/precautions one should take when dealing with a situation in which you have to use an internet connection provided by a landlord. I assume you would at least want to replace the router and modem, and from what…
XaolingBao
  • 897
  • 2
  • 9
  • 21
1
vote
1 answer

Post Data tamper detection

I have been studying a bit on security on how to make my mobile rest server secure. I am looking at one mobile application that uses plain HTTP. I have Charles proxy breakpoint enabled and edit the post data before submitting to their server. For…
keithics
  • 111
  • 6
1
vote
1 answer

How to configure WebScarab to intercept only POST requests?

I'm trying to make WebScarab intercept only POST requests. On the Intercept tab below Methods I've selected only POST, but it still intercepts all GET and POST requests, so it's quite hard to tamper data, because of massive amount of traffic going…
Vladislav
  • 119
  • 2
0
votes
1 answer

How I do get the correct the Tamper parameters from an internal web login

I am doing pentesting for a web application, but I do not know if am using the Tamper Data add on on mozilla correctly. Could anyone explain how to get the following parameters, and where do I need to look ? When doing the login, I would need to get…
ORP
  • 33
  • 1
  • 1
  • 6
0
votes
2 answers

PC showed evidence of a phone being attached for no obvious reason. Theories on why?

Connecting via remote desktop to a Windows 7 machine today showed the last couple of seconds of a windows device installing and the "Your device is ready" popup for a Sony Xperia T. Going to printers/devices showed an image of the phone. There's no…
Nick
  • 521
  • 3
  • 8
0
votes
1 answer

Preventing Windows from seeing/tampering with linux drive

Is there a way to prevent a Windows 10/11 system to access/modify/delete data from a secondary linux drive? I understand I can encrypt the linux drive, but wouldn't the windows system be still able to see the drive, and a potential malware or…