In this talk I’ll introduce radio hacking, and take it a few levels into hacking real world devices like wirelessly controlled gates, garages, and cars. Many vehicles are now controlled from mobile devices over GSM and the web, while even more can be unlocked and ignitions started from wireless keyfobs over RF. All of these are subject to attack with low-cost tools (such as RTL-SDR, GNU Radio, HackRF, Arduino, and even a Mattel toy).

We’ll investigate how these features work, and of course,…

Similar Posts

21 Comments

  1. Alright i will say this real real quick. Vulnerability exploitation is real and is out there to escalate privileges, Trojan-Ransomare uses a vulnerability in win32k.sys;mac or android,it often attempts to exploit. it were first detected by proactive technologies (Automatic Exploit Prevention, AEP) in August last year. The vulnerability was assigned the number CVE-2018-8453. After the exploit is executed, the Trojan acquires the highest level of privileges. Only few hackers and expatriates can provide the decryption keys.. That's why i'll always be grateful to Webghost { skype : webghost33} a great hacker who helped me with the decryption and also got back my files. I was so close to losing it all. Text via whats'app too [ 1 414 909 3913} if you ever feel threatened or got exposed to Cybercriminals

  2. If you can do that much with a Mattell IM ME… I wonder what you could do with this? http://cultureandcommunication.org/deadmedia/index.php/Cybiko

  3. I was having real life problems when my friend recommended Alvin to me. I contacted him because my business partner was shaking me, stealing money from the business and also my spouse was always up at odd hours clearly been cheating on me, so the hacker remotely hacked into their devices and granted me total access to their devices without their knowledge. I was overwhelmed that i could see their hidden finances that were off records and read their texts see new and deleted pictures emails call logs, Facebook, WhatsApp Snapchat, emails and all that. Now it’s not just suspicion I have facts and evidences against them… His email is alvinlandry007@gmail com or WhatsApp +17072677873 and i recommend him to everyone reading this post. He is the best man for the job. Thank me later

  4. FCC Indian Ocean? (.io)

  5. So when I hit my AC remote my neighers car starts…hehe?

  6. I think you are Iranian because you are very similar to us
    samy(سام) kamkar(کامکار) its an Iranian name

  7. Discussion on how to steal cars……….
    For those who do not want their car robbed………..put key fob in metal box when not in use………fool proof………no $$$ for this advice….

  8. Those Airplanes circling around are Spraying Heavy Metals and other things into the Sky . Lookup

  9. Very interesting. One thing I would suggest to improve the recordings is to repeat or summarise the questions before responding.

  10. I want to see a video covering Bluetooth exploitation using mobile devices

  11. garage door openers use rolling codes these days. the dip-switches are from a few decades ago. awesome info though! amazing 🙂

  12. Sure! Teach criminals how to steal our hard earned cars.

  13. you can contact kahlid hk expert and team on +1(520)3377269 and thank me later they are simply the best .

  14. NEED ONE OF THESE FOR MY RESEARCH. PLEASE TELL ME YOU STILL HAVE ONE THAT YOU CAN LET GO OF?

  15. It's nice you don't have to contend with the russian woodpecker any more.

  16. Smash that like button for Nick Cage.

  17. A safe way to lock/unlock a car is, instead of using a rolling key, use RSA with timestamp encryption. The car would send a public key to the key fob, and the key fob would respond with an encrypted and salted hash containing the encrypted pass plus the command. That would by encrypted via a timestamp as well, as part of the public key. The private key would be used to decrypt the (command + pass) hash, but would never be sent via radio.

    Edit: Just saw the final of the video, and you suggest the same. Nice!

  18. My guess is that PSK (phase shift keying) is harder to decode. Your device would see a single, fixed frequency, continuous signal.

  19. A good system design requires segmentation and isolation that considers security. Unlocking doors and rolling down windows via wireless is concerning, but if these systems are on the CAN bus; theoretically, you could send commands to other control units. Compromising the engine control unit and transmission control unit presents a moderate risk; but as more vehicles adopt electric controlled power steering and brake by wire systems, that is a very serious risk if they are compromised. Remote assist parking suggests that this functionality is there.

    The RF controls that are talked about here still only send out a 4 bit command. Those commands are limited to performing very specific and very limited functions. There is no way for someone to interface with the more safety-critical systems via the CAN bus, or to have the same capacity that is available through the OBD2 connector – without making physical/electrical changes to the car. Is there a REALISTIC possibility that someone could exploit a vehicle's systems wirelessly and covertly control steering or braking? The media would have us believe that its already a possibility. I don't think its possible without making electrical changes and installing added equipment.

Leave a Reply

Your email address will not be published. Required fields are marked *