{"id":44070,"date":"2021-10-21T00:00:00","date_gmt":"2021-10-21T00:00:00","guid":{"rendered":"urn:uuid:1d5a60c2-86f3-375e-c186-18328a086b0a"},"modified":"2021-10-21T00:00:00","modified_gmt":"2021-10-21T00:00:00","slug":"forced-entry-a-security-test-for-automatic-garage-doors","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/","title":{"rendered":"Forced Entry: A Security Test for Automatic Garage Doors"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/j\/forced-entry-a-security-test-for-automatic-garage-doors\/forced-entry-a-security-test-for-automatic-garage-doors.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/j\/forced-entry-a-security-test-for-automatic-garage-doors\/forced-entry-a-security-test-for-automatic-garage-doors.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The targets studied for this blog entry are Cardin S449-QZ2 remotes and receivers that support these remotes. We chose this remote because it was&nbsp;among several remotes that carry the DOR procedure, which we will elaborate on later. We used <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/news\/vulnerabilities-and-exploits\/attacks-against-industrial-machines-via-vulnerable-radio-remote-controllers-security-analysis-and-recommendations\">SDR<\/a> to capture and analyze the signals sent by each remote button push. After rooting out the frequency range, we were able to use a custom SDR frequency analyzer and observe two spikes representing the signal we wanted to capture.<\/p>\n<p>This signal was recorded using a complex file sink. We then decimated and demodulated it to reveal the data that we needed to extract and decode. For this we used tools like Inspectrum and the Universal Radio Hacker (URH) for decoding.<\/p>\n<p>We did this several times for all of the buttons, including the hidden button mentioned earlier. After recording several different pushes, we were able to identify fields like the command, fixed, and encrypted fields, which indicates a rolling\/hopping code mechanism. We needed to analyze the rolling code for the second scenario.<\/p>\n<h2><span class=\"body-subhead-title\">First scenario: Abusing the DOR feature<\/span><\/h2>\n<p>At this point, we can test the two scenarios. The first one hinges on the DOR procedure that involves a hidden button in the remote. As mentioned earlier, Cardin is not the only remote to carry this feature as it is commonly found even in devices made by different manufacturers. &nbsp;It is important to note that the remote\u2019s manual reveals that the hidden button allows one to remotely record a new remote into the receiver. We also found that this button can be replayed unlike the other buttons, thus the basis of the attack.<\/p>\n<p>We sniffed the DOR command and blocked the first button press. We did this by jamming it and recording it simultaneously. As a result, the procedure failed. This allowed us to replay the DOR button of the authenticated remote, play one of its button commands, and record our second remote by sending its button signals.<\/p>\n<p>The good news is that this technique would require an intruder to capture valid button keystrokes, including that of the hidden DOR button, which would be rare in a real scenario. An attacker would need to have access to the resident\u2019s actual remote or time their attack during the garage mechanism\u2019s maintenance.<\/p>\n<h2><span class=\"body-subhead-title\">Second scenario: Analyzing the rolling code<\/span><\/h2>\n<p>Moving on to the second scenario, we needed to decode the rolling code and to do so, we turned to the KeeLoq algorithm, which is used to protect the packet from being replayed and decoded. Studies have already shown that <a href=\"https:\/\/www.wired.com\/2015\/08\/hackers-tiny-device-unlocks-cars-opens-garages\/\" target=\"_blank\" rel=\"noopener\">attacks<\/a> on KeeLoq have been done before. Like many rolling\/hopping code mechanisms, KeeLoq does not use a timestamp that can help prevent an attacker from conducting replay attacks. For our case, we used Kaiju to analyze the rolling code, which allowed us to send a command over the air.<\/p>\n<p>But Kaiju presents some attentional limitations to non-LEA users. Nevertheless, an attacker can always look at remotes&#8217; memory and study the manufacturer keys to generate a rolling code on its own. This exercise can go further by looking at the remote cloner that includes master keys for several brands, which we show in our technical brief.<\/p>\n<h2><span class=\"body-subhead-title\">The PandwaRF device<\/span><\/h2>\n<p>One could argue that conducting such an attack would involve obvious equipment and defeat the purpose of a stealthy break-in. However, a device like the PandwaRF, a compact frequency analyzer with an Android APK, can make this setup portable and easier to conceal. In the technical brief, we show in better detail how this device can be used to also effectively capture and help decode signals.<\/p>\n<h2><span class=\"body-subhead-title\">Security implications<\/span><\/h2>\n<p>For intruders, the garage door might be a discreet option for breaking into a residence. Inside the garage, they can piece together a plan to break in further, hidden safely away from the view of passersby. They could also simply target whatever is inside the garage.<\/p>\n<p>This demonstration aims to show that these security gaps continue to exist and can cause a home\u2019s barriers to unravel in unexpected and covert ways. To prevent such attacks from materializing, manufacturers should take steps to add more security measures on top of the rolling code mechanism, such as the following:<\/p>\n<ol>\n<li><span>Using a different manufacturer key per remote and introducing diversification so that an attacker would have to find out the generation algorithm of each key, even after dumping the master key<\/span><\/li>\n<li><span>Debugging interfaces that are physically disabled on remotes and receivers<\/span><\/li>\n<li><span>Implementing memory protection on remotes and receivers to avoid possible leaks<\/span><\/li>\n<li><span>Using a seed when adding to the sync counter to complexify the brute force process<\/span><\/li>\n<\/ol>\n<p>For their part, homeowners should ensure that receivers are physically secured and well hidden. They should not leave their open garages unattended, be mindful of where they keep their garage remotes, and consider the use of traditional locks to secure their garages especially when they are out of town. They should also be aware of features such as the DOR procedure highlighted in this entry to prevent these from being used in attacks. Additionally, homeowners should note that the DOR feature can be disabled by removing a jumper on the receiver.<\/p>\n<p>This research aims to provide a framework to generate all keys and check if configurations are correct. We have described only a summary of the process here and provide a detailed description in our technical brief, \u201c<a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/j\/forced-entry-a-security-test-for-automatic-garage-doors\/TechnicalBrief-A-Security-Analysis-of-Garage-Door-Remotes-and-the-Danger-of-DOR-Attacks.pdf\">A Security Analysis of Garage Door Remotes and the Danger of DOR Attacks<\/a>.\u201d<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/j\/forced-entry-a-security-test-for-automatic-garage-doors.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this blog entry we revisit threats to automatic garage doors by using SDR to test two attack scenarios. We demonstrate a rolling code attack and one that involves a hidden remote feature. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":44071,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9514,9509,9597],"class_list":["post-44070","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-iot","tag-trend-micro-research-research","tag-trend-micro-research-smart-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Forced Entry: A Security Test for Automatic Garage Doors 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forced Entry: A Security Test for Automatic Garage Doors 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-21T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/j\/forced-entry-a-security-test-for-automatic-garage-doors\/forced-entry-a-security-test-for-automatic-garage-doors.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Forced Entry: A Security Test for Automatic Garage Doors\",\"datePublished\":\"2021-10-21T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/\"},\"wordCount\":926,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/forced-entry-a-security-test-for-automatic-garage-doors.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : IoT\",\"Trend Micro Research : Research\",\"Trend Micro Research : Smart Home\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/\",\"name\":\"Forced Entry: A Security Test for Automatic Garage Doors 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/forced-entry-a-security-test-for-automatic-garage-doors.jpg\",\"datePublished\":\"2021-10-21T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/forced-entry-a-security-test-for-automatic-garage-doors.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/forced-entry-a-security-test-for-automatic-garage-doors.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forced-entry-a-security-test-for-automatic-garage-doors\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Forced Entry: A Security Test for Automatic Garage Doors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forced Entry: A Security Test for Automatic Garage Doors 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/","og_locale":"en_US","og_type":"article","og_title":"Forced Entry: A Security Test for Automatic Garage Doors 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-21T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/j\/forced-entry-a-security-test-for-automatic-garage-doors\/forced-entry-a-security-test-for-automatic-garage-doors.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Forced Entry: A Security Test for Automatic Garage Doors","datePublished":"2021-10-21T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/"},"wordCount":926,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/forced-entry-a-security-test-for-automatic-garage-doors.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : IoT","Trend Micro Research : Research","Trend Micro Research : Smart Home"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/","url":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/","name":"Forced Entry: A Security Test for Automatic Garage Doors 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/forced-entry-a-security-test-for-automatic-garage-doors.jpg","datePublished":"2021-10-21T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/forced-entry-a-security-test-for-automatic-garage-doors.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/forced-entry-a-security-test-for-automatic-garage-doors.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/forced-entry-a-security-test-for-automatic-garage-doors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Forced Entry: A Security Test for Automatic Garage Doors"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44070"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44070\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44071"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}