Radio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec California 2016

Поделиться
HTML-код
  • Опубликовано: 20 мар 2016
  • Watch Samy most recent talk on Browser Manipulation • AppSecCali 2020 Closin...
    In this talk I'll introduce radio hacking, and take it a few levels into hacking real world devices like wirelessly controlled gates, garages, and cars. Many vehicles are now controlled from mobile devices over GSM and the web, while even more can be unlocked and ignitions started from wireless keyfobs over RF. All of these are subject to attack with low-cost tools (such as RTL-SDR, GNU Radio, HackRF, Arduino, and even a Mattel toy).
    We'll investigate how these features work, and of course, how they can be exploited. I'll be going from start to finish on new tools and vulnerabilities in this area, such as key-space reduction attacks on fixed-codes, advanced "code grabbers" using RF attacks on encrypted and rolling codes, exploiting mobile devices and poor SSL implementations, and how to protect yourself against such issues.
    By the end of this talk you’ll understand not only how vehicles and the wirelessly-controlled physical access protecting them can be exploited and secured, but also learn about various tools for hardware, car and RF research, as well as how to use and build your own inexpensive devices for such investigation!
    Samy Kamkar
    Samy Kamkar is an independent security researcher, best known for creating The MySpace worm, one of the fastest spreading viruses of all time. His open source software and research highlights the insecurities and privacy implications in every day technologies, from the Evercookie which produces virtually immutable respawning cookies, SkyJack, the drone that wirelessly hijacks other drones, and KeySweeper, a wireless keyboard sniffer camouflaged as a USB wall charger. He continues to release new tools and hardware, for examples most recently the ProxyGambit, OpenSesame and ComboBreaker tools.
    -
    Managed by the official OWASP Media Project www.owasp.org/index.php/OWASP...
  • НаукаНаука

Комментарии • 878

  • @markironmonger223
    @markironmonger223 3 года назад +52

    Possibly the best answer for the public acceptance of Def Con, literally laying out the pathway of how vastly distributed insecure systems can be horrifically exploited because security standards weren't even a consideration. The arc from innocent fooling with your garage door to literally stealing any vehicle anywhere so long as you have cased it earlier is just a solid gradient from happy fun to full GTA superthief. Samy Kamkar did a wonderful job, not just as a sploiter, but as a presenter, this is top level Def Con.

  • @RainDancerVideo
    @RainDancerVideo 4 года назад +107

    This is a very interesting talk. It gives even a non nerd a great insight into how insecure our world has become. "Just because it's invisible, doesn't mean it's safe" is a very eye opening statement. You have given me a new respect for hackers.
    Samy is a terrific presenter.

    • @nobodyimportant7655
      @nobodyimportant7655 Год назад

      Yeah he is one of the gang stalkers. That's why he teaches classes on this shit.

    • @pambrunner5716
      @pambrunner5716 Год назад

      A waist of time

    • @pambrunner5716
      @pambrunner5716 Год назад

      Wrong ail and or websight not mine?

    • @ITILII
      @ITILII Год назад +2

      Samy Kamkar one of the most brilliant people you'll ever hear !!! Samy is my HERO 😁

  • @3v068
    @3v068 4 года назад +37

    GM is the perfect example of listen when someone is speaking to you, and have the respect to, at least somewhat, hear it out.

    • @foreverhidden0465
      @foreverhidden0465 2 года назад +1

      So how would you defend against this sort of attack

    • @kipchickensout
      @kipchickensout 11 дней назад

      @@foreverhidden0465 A medieval shield

  • @Rorschak129
    @Rorschak129 4 года назад +26

    Sammy this video is so good man. Never heard such an interesting talk with such technical details and so much knowledge. Memes were on point too.you da man .

  • @Willam_J
    @Willam_J Год назад +17

    Thanks to Samy, you can’t buy an IM-ME, now, for under $800. Believe me, I’ve been watching for one. My wife and I also go to antique malls, thrift stores, flea markets, etc, and I always look through the toys, hoping to find one of these. I haven’t seen a single one, in six years of looking. Thanks Samy! 😂

    • @russellm7530
      @russellm7530 Год назад

      I just looked on ebay and there's a few for around two hundred dollars.

    • @aramic1989
      @aramic1989 Год назад

      yeah man, i literally sold one like a week ago for 140 bucks....whats silly though is all you need is an arduino, a TI CC1110 sub-GHz RF chip and a few more things, some programming and you have your 200 IM-ME

    • @edschissel9109
      @edschissel9109 11 месяцев назад

      90 bucks through Walmart online

    • @omegadroidzero
      @omegadroidzero 5 месяцев назад

      @@Willam_J You don't need a laptop to use a HackRF. Look up the portapack H2.

  • @jayjaystewart2561
    @jayjaystewart2561 3 года назад +5

    loved this presentation and how you displayed the slides too, very informative and kept it laughable and fun.

  • @jamesw6529
    @jamesw6529 4 года назад +28

    This is a very interesting lecture with a wealth of information. It would have been awesome of you to leave links for everything you are talking about.

  • @rommelrodriguez8376
    @rommelrodriguez8376 3 года назад +8

    Nice lecture, good overview of fun stuff to play with and the hardware/software starter tools.

  • @aminabali9575
    @aminabali9575 4 года назад +37

    I think this is one of the most interesting videos I've ever seen ! Thank you for all the great information and details 👌👏

  • @someguyontheinternet-
    @someguyontheinternet- 3 года назад +21

    This is so fascinating. I want to learn more

  • @viewingprophet4971
    @viewingprophet4971 4 года назад +2

    Oh the days of FSK Modulated Bit Shift Keys were sweet..Could open Garage any Garage Door so easy.. Remote gates were easy as well..But my oh my how things have changed... Great Presentation... Thank You

  • @bloguetronica
    @bloguetronica 4 года назад +36

    A safe way to lock/unlock a car is, instead of using a rolling key, use RSA with timestamp encryption. The car would send a public key to the key fob, and the key fob would respond with an encrypted and salted hash containing the encrypted pass plus the command. That would by encrypted via a timestamp as well, as part of the public key. The private key would be used to decrypt the (command + pass) hash, but would never be sent via radio.
    Edit: Just saw the final of the video, and you suggest the same. Nice!

    • @j4k3z
      @j4k3z Год назад +3

      I feel like as long as the action remains electronic it will always be vulnerable. Hence: the killswitch.

    • @TheCinderDude
      @TheCinderDude Год назад +6

      @@j4k3z sure but this is WAAAY harder to hack than regular rolling codes.

  • @whoisntwhoisit2126
    @whoisntwhoisit2126 4 года назад +22

    This was an excellent presentation, well explained! Thank you!

  • @billyhackett7610
    @billyhackett7610 4 года назад +101

    Had my attention the entire time. That is even more impressive than your brute force 4 second average cracking time.

    • @vicenteandrew4393
      @vicenteandrew4393 2 года назад

      i dont mean to be off topic but does any of you know a tool to get back into an instagram account??
      I was dumb forgot the password. I appreciate any help you can give me.

    • @patrickcollin2949
      @patrickcollin2949 2 года назад

      @Vicente Andrew instablaster =)

    • @vicenteandrew4393
      @vicenteandrew4393 2 года назад

      @Patrick Collin thanks for your reply. I got to the site thru google and im waiting for the hacking stuff now.
      Takes a while so I will get back to you later with my results.

    • @vicenteandrew4393
      @vicenteandrew4393 2 года назад

      @Patrick Collin it did the trick and I actually got access to my account again. I am so happy!
      Thank you so much, you saved my ass :D

    • @patrickcollin2949
      @patrickcollin2949 2 года назад

      @Vicente Andrew glad I could help xD

  • @monelfunkawitz3966
    @monelfunkawitz3966 4 года назад +50

    True story.
    My neighbors think I'm a little strange. They locked their keys in their car two months ago. Was walking the dog and talked to them. I told them I can take any sauce pan, put a rock in it, scream loudly in the pan and put the lid on, it will unlock any car. Went inside the house, got the pan and did this. Their jaws hit the floor. They tried for hours after I left.
    Maybe I should tell them I recorded their keyfob with my LimeSDR previously just in case and my daughter hit the mouse button after I told her to wait for my signal.

    • @ovencake523
      @ovencake523 3 года назад +8

      Just a question: Why do you have the car door codes for your neighbor's car?

    • @tanithrosenbaum
      @tanithrosenbaum 3 года назад +7

      @@ovencake523 Just in case...

    • @irishmick1156
      @irishmick1156 3 года назад +6

      Great lil story if it's true. Hehehehe

    • @ruhnet
      @ruhnet 3 года назад +1

      Priceless

    • @atmosrepair
      @atmosrepair 3 года назад +1

      Haha that is hilarious! Great thinking by playing a little joke with the sauce pan! I wonder if you ever told them what you really did!?

  • @thorthorbjornsen3853
    @thorthorbjornsen3853 4 года назад +2

    Recently discovered Samy. Great stuff, Man! TY!

  • @mannyarroyo4798
    @mannyarroyo4798 4 года назад +25

    I've been a Ham for over thirty five years and can remember driving around with my dad's car as a teenager with a CB and a 600 watt amplifier and activating bank alarms, opening electric gates and garage doors, and emptying the nightclubs by causing an ear piercing feedback to their sound systems.

    • @bargans3949
      @bargans3949 4 года назад +2

      lol

    • @billyjoejimbob75
      @billyjoejimbob75 4 года назад +2

      People in my area use to stop at a red light near a furniture store and turn on the touch lamps at night with their little 100-200 watt amps.

    • @jerrygaber6150
      @jerrygaber6150 2 года назад

      What an explicitive generator you are.

    • @cvspvr
      @cvspvr 8 месяцев назад

      ​@@jerrygaber6150huh?

  • @MrPinknumber
    @MrPinknumber 7 лет назад +46

    This talk is so damn interesting, loved it :D

  • @cornholiob7074
    @cornholiob7074 4 года назад +11

    One thing I think would be cool to add in the section relating to MITM attacks would be the usage of a deathentication attack or a re-pair attack as its known in Bluetooth. This can help capture that wireless handshake as well as cause a device to connect to your false network.

  • @Frizzle1981
    @Frizzle1981 5 лет назад +25

    that moment he opened the recorded garage door signal modulation waveform in audacity.... genius. Crystal clear! This is the core essence of hacking.... learning and understanding technologies, and use them in ways they weren't designed for.

    • @dandwrasan2342
      @dandwrasan2342 5 лет назад +3

      Chris Savage hi there seen your comment and thought you must know what your talking about I’ve got some questions on translating rf into binary

    • @SinanAkkoyun
      @SinanAkkoyun 4 года назад +1

      @@dandwrasan2342 Go ahead

  • @Thomas-gm7wb
    @Thomas-gm7wb 2 года назад +2

    Fascinating. Great job on the presentation. Ten stars

  • @Decentralized_Maze
    @Decentralized_Maze 3 года назад +3

    I thoroughly enjoyed every minute of this video. Superb content, clear and concise. A lot of details all at once lol, but perfect. I hope they pay you well 😆!

  • @thomasdadswell858
    @thomasdadswell858 4 года назад +3

    This is a brilliant lecture, natural teacher

  • @hassankrisht718
    @hassankrisht718 4 года назад +10

    extremely helpful ,full of interesting information. Thank you

  • @JohnBuggy
    @JohnBuggy 3 года назад +2

    Absolutely brilliant lecture!

  • @anupr3592
    @anupr3592 3 года назад +1

    Worth every minute😍😍 RF is a very interesting topic. Dude😍😍

  • @johnnykeeton8369
    @johnnykeeton8369 4 года назад +49

    I like how he is so excited but ham radio operators have been using this equipment for a while. Everything begins with the understanding of RF.

  • @adrianotto
    @adrianotto 8 лет назад +17

    Great talk Samy!

  • @lemon3rd800
    @lemon3rd800 7 лет назад +174

    From half an hour to just eight seconds - This is insanely fast.

    • @mkcvx
      @mkcvx 7 лет назад +17

      now you understand the power of Math ;)

    • @masskiller9206
      @masskiller9206 4 года назад +10

      Every garage door on the block opens in an 8-second span

    • @GODofTimewaste2
      @GODofTimewaste2 3 года назад +16

      @@masskiller9206 I would love to see someone transmitting that code with stupidly high transmitting power, just to open random garage doors in a city all at the same time. Just for the lols.

    • @masskiller9206
      @masskiller9206 3 года назад +5

      @@GODofTimewaste2 regular power, very high gain antenna lol

    • @GODofTimewaste2
      @GODofTimewaste2 3 года назад +3

      @John fine, _suburban area of a city_ . I bet there are devices that would react to this even in an urban center though.

  • @eventhorizon8014
    @eventhorizon8014 4 года назад +8

    This is just amazing ! I'll order a RTL-SDR right next month :) I'm sooo excited what i'll find...

    • @Wiresgalore
      @Wiresgalore 4 года назад +4

      Buncha cool stuff! google WebSDR if you aren't already familiar to get a taste for sniffing the airwaves. I prefer the one in the Netherlands, I get lost in it for hours sometimes

    • @TheHellRay
      @TheHellRay 4 года назад

      what did you find? :D

    • @stein1885
      @stein1885 3 года назад

      @@Wiresgalore That is the best imo.

    • @mattmurphy7030
      @mattmurphy7030 2 месяца назад

      Did you get one??

  • @cryzz0n
    @cryzz0n 2 года назад +2

    This is a fantastic video. Glad Samy is on the good side of the law. Do you know if auto manufactures are only fixing new car systems or do they also have some kind of hardware upgrade system to improve older cars?

  • @joanx9722
    @joanx9722 2 года назад

    I definitely need to hear about this bc it's been a problem with this in my on life ... thank you so much for this

  • @melvinmprasad6117
    @melvinmprasad6117 3 года назад +3

    That was awesome. I learned 1 new thing so excited.

  • @prisoneroftech2237
    @prisoneroftech2237 7 лет назад +317

    I think I will 'record' the frequency for my car and keep that data just in case I loose my key.

    • @chewysplace3542
      @chewysplace3542 6 лет назад +21

      funniest comment on here ...

    • @fadyserhan9537
      @fadyserhan9537 6 лет назад +2

      good

    • @DupczacyBawol
      @DupczacyBawol 5 лет назад +34

      It is not gonna work. Car key signals are encoded and encrypted using random numbers and algorithms like KeeLoq cipher.

    • @aroberts269
      @aroberts269 5 лет назад +17

      @@DupczacyBawol Correct. But, Samy created the code to successfully capture the signal and do so as mentioned above. He obviously will not release the code due to malicious use. Look at his site/google for the article. RollJam by Samy Kamkar

    • @SecureYourHacks
      @SecureYourHacks 5 лет назад +31

      there is a synchronization counter C which gets incremented each time you press the key (of transmitter). Same way the receiver also stores the most recent validated synchronization counter it has received (N). Now when ever you press the key and send the pseudo-random number to the transmitter the transmitter also takes the synchronization counter C from transmitter (and to update itself will overwrite N with C). Now receiver will also produce the Cth code (corresponding to C i mean) and match with the code send by transmitter. There is also rolling window of acceptance for rolling codes say 100 or 1000 or whatever (depending upon which system you using for your Garage or Car keys). Now also note that C-N

  • @johnaweiss
    @johnaweiss Год назад +1

    Wow, the De Bruijn sequence is amazing! I wonder if vehicle makes now perform validation or hash their pw's.

  • @fifaham
    @fifaham 4 года назад +2

    To view wider RF spectrum then use hand held spectrum analyser with small embedded display - they are about $100 up to few thousands dollars in price depending on capabilities. You may get basic hand help SA for $200 or so and view all frequencies say from 15 MHz up to few GHz in freq.

  • @KipIngram
    @KipIngram 3 года назад

    Great presentation, Samy.

  • @fflynnful
    @fflynnful Год назад +2

    Interesting information. This shows that there is nothing quite like a hidden kill switch on your vehicle. Put the switch in line with power to the starter or ignition and make it hard to find easily. Hardware trumps software. The best place might be the power line to the fuel pump. The engine will crank and might start, until it shortly runs out of fuel.

  • @jlboygenius
    @jlboygenius 5 лет назад +14

    Interesting! I did something similar to reproduce the remote to an adjustable bed. Found out it used a CC2500. Now I can use my phone or Alexa to control the bed. :)

    • @publicmail2
      @publicmail2 5 лет назад +1

      Wow incredible you must use sure app!

  • @SecureYourHacks
    @SecureYourHacks 5 лет назад +8

    For those who did not get the concept :
    there is a synchronization counter C which gets incremented each time you press the key (of transmitter). Same way the receiver also stores the most recent validated synchronization counter it has received (N). Now when ever you press the key and send the pseudo-random number to the transmitter the transmitter also takes the synchronization counter C from transmitter (and to update itself will overwrite N with C). Now receiver will also produce the Cth code (corresponding to C i mean) and match with the code send by transmitter. There is also rolling window of acceptance for rolling codes say 100 or 1000 or whatever (depending upon which system you using for your Garage or Car keys). Now also note that C-N

  • @Zany4God
    @Zany4God 3 года назад +1

    I only had an inkling this was going on. Thanks for sharing.

  • @rickeyracer44
    @rickeyracer44 7 лет назад +10

    Brilliant!!! VERY Interesting!!!
    I sure hope the car manufactures whom you shared your discoveries, of the "vulnerabilities in security" offered you more than a handshake, and a thank you. I'm sure this discovery to you was only one of curiosity, and a hacker's delight, although with this information you sir, have helped progress technology as we know it.... not to mention saved alot of peoples cars from getting jacked!!! (LOL) I thank you. keep on hacking brother.

    • @MrBademy
      @MrBademy 5 лет назад

      even scarier !!! with technological backdoors like this one can easily perform a terrorist attack or a murder, just take control of his car and slam him offroad or lets say in whitehouse ?! crazy, this guy is like Tony Stark of hacking, good job Samy, you are my new idol ! :)

  • @k.m.rayhan1035
    @k.m.rayhan1035 2 года назад

    it was a nice presentation. I am little curious about the questions end of the presentation. bt thanks for the knowledge .

  • @PotatoOfDestruction
    @PotatoOfDestruction 7 лет назад +223

    Samy is still my hero!

    • @noson_
      @noson_ 5 лет назад +8

      My space

    • @Cygnus0lor
      @Cygnus0lor 5 лет назад +10

      @@noson_ is your space

    • @noson_
      @noson_ 5 лет назад +5

      @@Cygnus0lor sorry I do not understand want you are writing me

    • @Thekimfowler
      @Thekimfowler 4 года назад

      whizhackz ofoz .com

    • @RogBearD
      @RogBearD 4 года назад +2

      Good for you kid, living villains are becoming heroes to ppl nowadays. Where the world has come into.

  • @instablaster.
    @instablaster. Год назад

    This was great presentation

  • @EddieLeal
    @EddieLeal 4 года назад +156

    I now remove my battery and all 4 wheels. It a pain but if they want my car they will have to really work for it. 🤣

    • @RWBHere
      @RWBHere 4 года назад +7

      They will just vandalise it and strip out anything of value. Does your alarm still work without the battery?

    • @omegachaos32
      @omegachaos32 3 года назад +5

      Haha, you've essentially described what motorcycle, moped and bicycle riders do in large cities through metaphors. I've had one motorcycle stolen and another severely damaged in the attempt. That's with tech that has nothing to do with this video.

    • @sunyun4425
      @sunyun4425 3 года назад +2

      Wheel lock

    • @codywhitlock8793
      @codywhitlock8793 3 года назад

      @@sunyun4425 One of those extremely loud vibration alarms, active GPS, and a WHEEL LOCK is about your best bet and line of security. Other than that, the best security for your motorcycle is a highly reputable insurance company with exceptional theft protection.

    • @Max-ji4im
      @Max-ji4im 2 года назад

      😂😭😭😭😭😭😭

  • @roberrewyatt3989
    @roberrewyatt3989 Год назад

    Thank you, Samy!!! For the info...

  • @eliseyman
    @eliseyman 3 года назад +1

    Hey Samy, do you know is it possible (in theory) to duplicate car remote key (it’s features) onto a different device with remote capabilities? - If using my own key, there is an option to duplicate it to other digital device with remote options.

  • @xvier777
    @xvier777 Год назад

    This was so fun to watch! Thanks

  • @alexbrown128
    @alexbrown128 2 года назад

    As soon as you started explaining that you were cutting the pauses between the signals I said to myself "we can use superpermutations here"

  • @fifaham
    @fifaham 4 года назад +2

    For time frame of 30:00 today ARM MCU have the capability of securing all communications by HW under supervisory mode, unless you are dealing with older technology then you will be at risk because todays ARM MCU have very strong security and strict supervisory mode preventing unauthorised users to intervene. Old technology did not have the ability to lock supervisory mode and allowed intruders to switch from User Mode to Supervisory Mode wirelessly or via WiFi or even if cable connected.

  • @robinwells8879
    @robinwells8879 4 года назад +49

    Exciting and disturbing in roughly equal measure. I like classic cars all the more now!

    • @gazzacroy
      @gazzacroy 4 года назад +1

      lol I hear that one .

    • @yams3954
      @yams3954 4 года назад +5

      but classic cars are much easier to break into

    • @robinwells8879
      @robinwells8879 4 года назад +7

      TheBreakfastGod you are not wrong. My car has no keys or locks for that matter and starts with a screwdriver. That said, perhaps not so easy to gain access to when at speed on the road 🤣.

    • @atmosrepair
      @atmosrepair 3 года назад +3

      Yep oldies but goodies. Lot less to go haywire, lot less sensors. All this tech in vehicles has amounted to big bucks for the dealerships.

    • @atmosrepair
      @atmosrepair 3 года назад +3

      @@yams3954 yes they are, but if a person wants to steal something bad enough they will find a way usually.

  • @MowiWowi
    @MowiWowi 2 года назад

    im glad your on our side

  • @sulest
    @sulest 7 лет назад +10

    RF are so easy to hack, some time ago spend a day researching them. I found 315 and 433 Mhz are reserved for home automatization and basic security use. I got a Chinese universal remote controller that supports IR and RF on 315 and 433 Mhz and with push of a button I was able to clone and resend the signals for most of the things I have at home like door bell, car unlock and lock smart light switches panic buttons and others. It takes just few seconds to record the signal. But for more detailed knowledge Samy's video is just perfect. It's saves you allot time. Thanks man.

    • @dandwrasan2342
      @dandwrasan2342 6 лет назад

      SS Suleyman is it so easy like you say to hack these signals ?

    • @abdallahshuaibu2149
      @abdallahshuaibu2149 5 лет назад +1

      The wave the car key sends is encrypted

    • @DupczacyBawol
      @DupczacyBawol 5 лет назад +1

      No, you are wrong regarding digital transmission.

    • @dandwrasan2342
      @dandwrasan2342 5 лет назад

      Abdallah Shuaibu that’s true 👍🏻

  • @mustache2295
    @mustache2295 4 года назад +3

    Well timed sip at 20:54. Confidence is exuding from this man here lol.

  • @bneexotics2120
    @bneexotics2120 2 года назад

    Great presentation 👍

  • @JamieJones1985
    @JamieJones1985 4 года назад +8

    Very interesting. One thing I would suggest to improve the recordings is to repeat or summarise the questions before responding.

    • @omegachaos32
      @omegachaos32 3 года назад +2

      Agreed. The last 5 minutes, roughly, were useless since we couldn't hear the questions and there weren't enough context clues to figure out what was being asked.

    • @atmosrepair
      @atmosrepair 3 года назад

      Yup thought the same thing. Someone get that man a microphone, or as you say, just simply repeat the question for us.

  • @KLWCOMM
    @KLWCOMM 4 месяца назад

    All well said - how about some suggestions on how to protect yourself from key fob attacks? A simple one is to shield the key fob with a simple faraday cage, such as an aluminum foil, while at home or in the parking lot, if it comes to that.

  • @JohnWalker-256
    @JohnWalker-256 3 месяца назад +1

    Legends without cars are watching ❤❤

  • @FunkyFalafel
    @FunkyFalafel 3 года назад

    Great vid man! Thanks bro! Any spare kit would be awesome!

  • @anthonycontreras5613
    @anthonycontreras5613 4 года назад +2

    thank you for this video!

  • @TehVulpez
    @TehVulpez 5 лет назад +57

    lmao good opener "we all love nic cage right"

  • @TheUnpreparedMind
    @TheUnpreparedMind 3 года назад +1

    What would you use to find out if somebody is chipped a frequency detector or a emf detector??

  • @MaxJaMaija
    @MaxJaMaija 4 года назад +2

    With RTL-SDR you can do much much more, AIS, Weather satellites and more

  • @change3541
    @change3541 2 года назад

    awesome presentation brother

  • @thebesteverever6751
    @thebesteverever6751 2 года назад

    this video was so informative thank you

  • @skidoodles
    @skidoodles 3 года назад +1

    What's the indicator for a car to know that a code has been used before? Does it have a memory and logs history codes? Or go through a list of possible codes one by one in a random sequence? What if you've maxed out all the possible codes, does it start repeating codes?

  • @fjs1111
    @fjs1111 2 года назад +3

    Rolling codes are very easy to catch, simply create a higher amplitude signal near there garage door and have a receiver where about they would activate it to open it. Sometimes they press it too soon anyway out of range, but as you said exactly repetition but rolling codes themselves are actually *breakable*. If you can capture numerous codes from opens and closes, you can actually use a deductive algorithm to reduce the time to what I calculate could be only a few days as there is no lockout. I call this attack deductive unrolling ;-) as you s aid, might be easier to kick there door in and get the keys. But, I don't like to give too many ideas publicly somewhat reluctant to even post this. Another thing, the rolling codes do have limits on older units so I believe it's usually 65k codes, newer one's have larger bit sequences. Now, WiFi enabled openers are gaining popularity and using pcap and simple wifi security flaws like one in Chamberlain (liftmaster) they leave ports open and you can pull the API cgi page which interfaces with the mobile app and it's easy enough for people like you and me. On car keys such as that on one of my older benz's, it actually uses IR for LoS functions like lowering windows and the IR portion may even have other functions. Again, I may delete this post as I'm a bit nervous over the possibilities and potential attention on this, and I was able to capture that with a learning IR remote and replay it. Worked once assuming I was near the transmitter unlock.

    • @BitSmythe
      @BitSmythe 6 месяцев назад

      … near *THEIR* garage…

  • @gabrielborges7909
    @gabrielborges7909 27 дней назад

    The part where talks about spoofing a ship's gps signal really made me think of the Key bridge incident. I'm not saying it was hacked, but the fact that it's possible is mind boggling.

  • @TiborRoussou
    @TiborRoussou Год назад

    Time well spent!

  • @hfe1833
    @hfe1833 4 года назад +7

    The more I listen to him the more interesting

  • @ViktorEngelmann
    @ViktorEngelmann 4 года назад +3

    Very good presentation :-) just one thing: please repeat the questions in the Q&A

  • @JD_Mortal
    @JD_Mortal Год назад +1

    The problem with rolling codes... They all roll around back to the beginning. In a way, they are exactly as easy to crack as a stationary code of the same length.
    If you roll... 123, 234, 345, 456, 567... 901, 012, 123...
    Just broadcasting "123", every single time, you will eventually hit "123", after it rolls-around, as fast as if "901" was the ONLY code, and you had to step-up to "901".
    As for being a rolling "set" of fake randoms... That makes it even easier, because there are even MORE values that are "true", not "less", in that same range. It will accept "123" OR "567" OR "091", because any of those could be "possible" as your random "next" code that it has to accept as "true".

  • @lordtimebomb6792
    @lordtimebomb6792 4 года назад +1

    Does this video talk about hackers listening in on your car convos??

  • @nezerac
    @nezerac 4 года назад +1

    @8:30
    .....isn't that what they do when they climb for altitude?

  • @charlesclements4350
    @charlesclements4350 4 года назад +12

    I can not hear the questions coming from the audience.

  • @LeifNelandDk
    @LeifNelandDk 4 года назад +2

    To prevent the jam+replay hack, if the rolling code is just continuing for every keypress, locking the car should invalidate the previously recorded unlock code.

    • @blauwzakjecrack
      @blauwzakjecrack 4 года назад

      nope, wont work, the reciever misses some of the transmitted rolled codes and thus is out of sync and dous not know what rolledcode it missed in the series excpected codes (in a recieve only setup), to fix this you could use spectrum of possible rolled codes (with reset evry x try`s , but his increases accessibility of brute force.

  • @cvspvr
    @cvspvr 8 месяцев назад

    samy is my hero!

  • @alexlee6129
    @alexlee6129 4 года назад +1

    So if you take someone's key fob and press unlock 1000 times while it is out of range of the receiver, that key fob would stop working forever?

  • @AliHussain-yt2zl
    @AliHussain-yt2zl 3 года назад +1

    Wat about remote neural monitoring can you detect that at ulf ultra low frequency from 0mhz to 70mhz

  • @PamelaLogan
    @PamelaLogan 8 месяцев назад

    Wow! Thanks for doing this. Are you saying that we don't need to use an expensive spectrum analyzers to find signals? Signet Intelligence has that capability. Id like to find out who is bombarding v2k technology to my head. Noticed sonar rays hitting my head while wearing a tight head wrap. Can hear a tracking sound.

  • @BuckFitches
    @BuckFitches 3 года назад

    i like samys style to make us understand all this bs.....thanks man

  • @awolff3381
    @awolff3381 2 года назад

    in the old days my dad had a garage door opener that had a roller switch where you could just stand in front of whatever door hold down the button then roll the switch back and forth till it opened it took seconds

  • @bdr420i
    @bdr420i 2 года назад +2

    When you find a video which already you hit like on it but you don't remember it, do you watch it again?

  • @Haxr-dq6wt
    @Haxr-dq6wt 3 года назад +2

    This dude make things soooo easy, he should make courses

  • @fifaham
    @fifaham 4 года назад +2

    The scrolling code of clicker is not random but quasi random, meaning the series of passwords repeat after certain number of passwords had elapsed - for example the scrolling codes list repeat after 60 times of using different password codes. Professional thieves attach a receiver to your car without your knowledge to record all the rotating codes of your car and store it in their receiver then copy those codes into their transmitter to have complete control over your car - they use the same scrolling code of your car or garage. You will know that there is something attached to your car when the Bluetooth of your car keeps disconnecting and reconnecting or your mobile gets disrupted at times, then you need to inspect your car for some magnetically attached bug to your car from under your car. Use your camera phone with long stick to pass it all under your car and observe any attached bug. Once you find it present it to the police and have it investigated for finger prints, if any. When the police refuse to cooperate then you know they may have attached it to your car, or were instructed not to cooperate LOL

  • @Sam-yz7vm
    @Sam-yz7vm 4 года назад

    very interesting and existing presentation :-)

  • @Nash4Nashville
    @Nash4Nashville 4 года назад +5

    Glad he's one of the good guys!

  • @marianbieda
    @marianbieda 2 года назад

    Really good one, thanks.

  • @bloguetronica
    @bloguetronica 4 года назад +1

    My guess is that PSK (phase shift keying) is harder to decode. Your device would see a single, fixed frequency, continuous signal.

    • @mattmurphy7030
      @mattmurphy7030 2 месяца назад

      PSK is very easy to decode. SDR software has it built in.

  • @jimksa67
    @jimksa67 Год назад +1

    It would have been nice if you had repeated the unheard question. Fascinating video. I only drive old unfobbed vehicles lol

  • @dandwrasan2342
    @dandwrasan2342 5 лет назад

    Great vid and a highly intelligent man

  • @gjgedi
    @gjgedi 4 года назад +1

    Samy i really like this video but it’s 4 years old have you got an up date?

  • @williamcruz364
    @williamcruz364 6 лет назад +1

    Were can I buy THIS GADGET? 👍

  • @LarryCook1960
    @LarryCook1960 3 года назад +3

    Garage door openers haven't had DIP switches in a long time. All modern ones are rolling code.

    • @mmaranta785
      @mmaranta785 3 года назад +1

      In the mid 70’s I had a Genie Alliance remote garage opener. I drove around my neighborhood on my bike with an Allen wrench and turned the adjustable ferrite coil (changing the frequency) and actually got someone’s garage to open.

    • @mattmurphy7030
      @mattmurphy7030 2 месяца назад

      I just installed a new garage door opener and it has dip switches…

  • @abdelrhmanawad5449
    @abdelrhmanawad5449 2 года назад

    Awesome content

  • @computerwizard2613
    @computerwizard2613 2 года назад +1

    45:50 “does Chrysler also have...” best part of video :) dyed laughing

  • @tenzindukdak5132
    @tenzindukdak5132 3 года назад

    This video is essentially opening gates for new hackers

  • @jeffreymorris1752
    @jeffreymorris1752 Год назад +1

    Samy is likely also an authority on cease-and-desist notifications. Pretty certain he could safely ignore most if not all of those.

  • @rickeyb9572
    @rickeyb9572 2 года назад

    Great Job !!! Love it !