Radio Hacking: Cars, Hardware, and more! – Samy Kamkar – AppSec California 2016
Radio Hacking: Cars, Hardware, and more! – Samy Kamkar – AppSec California 2016
Watch Samy most recent talk on Browser Manipulation https://www.youtube.com/watch?v=K1T_miPTvPA
In this talk I’ll introduce radio hacking, and take it a few levels into hacking real world devices like wirelessly controlled gates, garages, and cars. Many vehicles are now controlled from mobile devices over GSM and the web, while even more can be unlocked and ignitions started from wireless keyfobs over RF. All of these are subject to attack with low-cost tools (such as RTL-SDR, GNU Radio, HackRF, Arduino, and even a Mattel toy).
We’ll investigate how these features work, and of course, how they can be exploited. I’ll be going from start to finish on new tools and vulnerabilities in this area, such as key-space reduction attacks on fixed-codes, advanced “code grabbers” using RF attacks on encrypted and rolling codes, exploiting mobile devices and poor SSL implementations, and how to protect yourself against such issues.
By the end of this talk you’ll understand not only how vehicles and the wirelessly-controlled physical access protecting them can be exploited and secured, but also learn about various tools for hardware, car and RF research, as well as how to use and build your own inexpensive devices for such investigation!
Samy Kamkar
Samy Kamkar is an independent security researcher, best known for creating The MySpace worm, one of the fastest spreading viruses of all time. His open source software and research highlights the insecurities and privacy implications in every day technologies, from the Evercookie which produces virtually immutable respawning cookies, SkyJack, the drone that wirelessly hijacks other drones, and KeySweeper, a wireless keyboard sniffer camouflaged as a USB wall charger. He continues to release new tools and hardware, for examples most recently the ProxyGambit, OpenSesame and ComboBreaker tools.
–
Managed by the official OWASP Media Project https://www.owasp.org/index.php/OWASP_Media_Project
it was a nice presentation. I am little curious about the questions end of the presentation. bt thanks for the knowledge .
Bad Ieutenant POCNO Lizardz
Can track and trace my stolen phone?
Check out AM frequencies 666 upwards ….you can hear these demonic creatures through the white noise
What do you know about things that cause this buzzing in your ears? Im on this for some reason. Can you help me? What if someone is misusing devices and hurting people.
hazadhackha_ is that guy, how he gave me an original certificate even with my lapses in school is beyond me, but I have a solid job with that certificate, safe to say it worked, I shouldn’t have said that, oops but I’m Anonnymous who would know? Hahaha .
oh man….this is scary as hell for a TI….
Contact horuxx .ru if you ever need a cybersecurity services, they do amazing work.
in the old days my dad had a garage door opener that had a roller switch where you could just stand in front of whatever door hold down the button then roll the switch back and forth till it opened it took seconds
Now this is some useful information
he should of called the method "jam roll"
LOL, You can go to the FCC website and use the info for free, but it is hard to use., yet Mr. SPY with his Countries backing can use it with his tools, rich!
im glad your on our side
whoa dude do you see that door behind him marked pirate, you think a pirate live in there???????????
So what you are saying is regardless of having a key fuab a hacker could unlock your doors and or honk your horn or that.
Samy is gonna wreck the car
@19:38 there is no 2ms delay! There is just a 2ms span dedicated to each bit (Look at the graph @19:00). The bit can fill either 3 quarters of the 2ms span to represent 1 or just one quarter of it for 0. So there is no 2ms delay that he talks about (@20:45) and brought in his calculations. This huge misunderstanding suggests that he is not the master mind of the whole story, but probably just a face.
Fascinating. Great job on the presentation. Ten stars
Sniffing something that’s for sure
As soon as you started explaining that you were cutting the pauses between the signals I said to myself "we can use superpermutations here"
some one just hacked my key fob yesterday and remote started my vehicle. 2 hours later they also unlocked the doors while i was inside a restaurant. How do I protect against this?
I was furious about knowing what was going on on my partners cell-phone and ended up getting scammed twice,so i found a Russian hacker on a YouTube post and i heard he’s pretty good and yes he made me know every detailed information on the phone. So guys so many scammers out there,i want to take my time to share you the Instagram page of a real hacker i know @WINGLOCKHACK. Save your time and money.
After 9 years of my graduation, I came to know why this subject was in Computer Science and Engineering in India.
I wish that you repeated the questions. So I could understand what you were responding to.
I will never rely on gps again. Holy.
As we are living in an age where we tend to be very dependent on phones, computers and other digital devices. The advantage of this lies in the fact that we can easily find out if our husband or wife is having an affair by just gaining access into their phones. There’s this amazing hacker called CYBERMICHEAL which help such concerned partners to monitor the activities of their partners on their phone without letting them know. You will be able to gain access to monitor the phone in real time. You will be able to monitor phone calls, text messages, call log, call recording, GPS location, photos and videos from target’s phone. This will enable you find out the truth about your marriage/relationship, and also know if anything is being hidden from you. This service works perfectly well for all phone types – Windows, iPhone devices and Android phones.
You can contact this amazing hacker via Gmail: Cybermicheal1995@gmail.com or Whatsapp on +18722250930
,,
Okay you show thieves how to steal/break in – now how about showing responsible ppl how to thwart this BS? Moms must be proud, geez
Locking scooters is what makes dangerous interference to then throw u off . Had fun for while but sinister as fuk
Fbi planes have now pivoted to drones and there’s prob 60 drones from the once 2 planes. I can see the hertz from these drones via naked eye
This will sure help the bad guys. They must love you 👎
He says "All our cars are becoming connected, This is great" IT IS NOT FK’ing GREAT AT ALL!!!! its a bunch of BS!
Can u hire my chain saw, go ruuuwwwtttt
📣Yeah I get my account back love u
You guys and you the best place work big.d.hack on InstagramYeah I get my account back love
You guys and you the best place work big.d.hack on Instagram
Good thing my phone has Probe attack protection built-in.
Code monkey shout out!! Cool
gps is not sat based its ant based
Really good one, thanks.
this video was so informative thank you
These people often have large backpacks.
I did not understand the brute force part. Could someone explain that?
im glad your on our side
Question Samy! If I am searching for a vehicle that was involved with a freeway "roadrage" murder, and I have the make, model, location and time, could you help? It’s a long shot but the vehicle would have been equipped with onstar.
Nicholas cage is nicholas cappola
Who else googled the IM-me? Lol
Sir how my thinking hacking by radio frequency, becoze when ever iam thinking inside me my formor church pepole (hackers) sending same recomondations in youtube,in 2016 i sleep in church premisis i experience some eloctric shock in my right side belli area,then iam manuepulated by them i canot live myself no privasi to i feel so bad plz replyto my comment.
Boring and does not hold attention, annoying voice and i wanted to get into the topic and the info but this presentation is just boring useless garbage… 20$ something device… gone in 60 seconds bla blah blah like what are you trying to talk about here… get your shit together guy…
45:50 “does Chrysler also have…” best part of video 🙂 dyed laughing
I wonder, if you attempted to brute force a garage door in a residential area then what’s preventing you from opening other garage doors in the area during the process?
What if someone sent a random video to my phone. And when that video was finished it was gone. With no trace. It looked like a YouTube video but didn’t show up in history. How do I find out who sent it?