SlideShare a Scribd company logo
1 of 47
Download to read offline
Car Hacking: Yes, you can do that!
Andrey Voloshin
CTO @ Théa
Alexander Olenyev
Hardware Engineer @ Théa
https://techmaker.ua
info@techmaker.ua
https://fb.com/techmaker.ua
@techmakerua
Andrey Voloshin
twitter: @anvolhex
telegram: @anvol
Safety
• Eat
• Move (vehicles are here)
• Rave
• Sleep
• Repeat :)
Why you should care
• Better place to live
• $$$
• Fame
• High risk
– Anonymous Volunteer
Car hacking is about seeking for
unusual behaviour
–Robert Bates, chief safety officer for automotive at Mentor, a Siemens Business
If I am the CEO of General Motors, five years
from now the last thing I want to see is an email
in my inbox in the morning that says
‘Pay me $2 billion or else all of your cars are
going to turn left.’
Bring some juice plz
Domains
• Physical vulns
• Mobile Apps (car alarm/security, remote control, maintenance)
• Architectural
• Remote compromise via In-Vehicle Infotainment systems (IVI)
• ADAS
• Shaken, not stirred
Physical
• Jamming + stealing. Rule them all. (out of scope)
• Valuable parts are easily accessible
Physical. But clever
• Find something connected to CANbus
• Actuators w ECU (autofolding wind mirrors)
• Sensors (radar, parking assist?, cameras?)
• Use workshop manuals
• Inject messages (impersonate ECUs, open doors)
– Yes, suddenly you may need them to drive your car ¯_(ツ)_/¯
Mobile Apps
– Wired, 2015
Security researcher Samy Kamkar showed in 2015 that
he could use a small piece of hardware hidden on a car
to wirelessly intercept credentials from iOS apps like
GM's Onstar, Chrysler's UConnect, Mercedes-Benz
mbrace, and BMW's Remote. Kamkar's attack similarly
allowed him to remotely locate those cars, unlock them,
and in some cases start their ignitions.
– https://www.troyhunt.com/no-vtech-cannot-simply-absolve-itself/ 2016
Troy Hunt and Scott Helme figured out that the Leaf’s app
interface (API) uses only the Vehicle Identification
Number (VIN) to control car features remotely without
passwords
– Researchers at UK-based penetration testing and cybersecurity firm PenTestPartners, 2019
An analysis of the APIs used by the Pandora and Viper
mobile apps revealed that they were affected by insecure
direct object reference (IDOR) vulnerabilities
– Marcus Aurelius, 150 AD
OBD devices w BlueTooth connectivity, default PIN and
sends custom CAN frames
Web attack vectors
1 2 3 4. Aftermarket
1. PKI, secure boot, source codes, backdoors, etc
2. OEM backend infrastructure (including app stores, connected car solutions, IVI
backend, databases, documentation)
3. Diagnostic equipment, engineer codes, key duplicates, etc
4. Control car, steal car, dump private data, etc
Backend
• Misconfiguration, dev/qa/staging env with weak security
• Ancient solutions/technologies
• Workshop manuals
• APIs without security assessments
– when something without attention goes wrong
Architecture
Dump it
Security Architect crying right now
Immo, $ecurityAccess
• Weak challenge-response
• JTAG enabled
• Secrets stored in unencrypted Flash/ROM (coz there is no other option)
• IDA, GHIDRA, radare
RF hub in trusted zone
• Weak encryption (Tesla’s key fob with 40-bit cipher) — the KU Leuven team
discovered in the summer of 2017
• Weak PRNG
• Jamming the signal
• Relay
• Replay rolling codes
Key fob hack to unlock 100 million VAG cars
// 2016
• With only four unique cryptographic keys used by most of the 100M
cars, it means millions and millions of cars will be exposed once a
hacker will find one of the four keys.
• The research led by Flavio Garcia and David Oswald also refers to
the vulnerability of other cars from different automakers. Millions of
vehicles from Ford, Nissan, Mitsubishi, Chevrolet, and other marques
are vulnerable to a similar attack using a home-made device ($30
SDR).
Dale “Woody” Wooden could unlock a Ford vehicle,
interfere with its onboard computer systems, and even
start its engine.
The vulnerability affects the key fobs of 2019 Ford F-150
Raptors and 2019 Ford Mustangs, which use a radio
frequency in the lower 900MHz spectrum, and the key
fobs of at least one slightly older model, the 2017 Ford
Expedition, which uses 315MHz.
– https://the-parallax.com/2019/05/03/hacker-ford-key-fob-vulnerability/ May 2019
In-Vehicle Infotainment system
• Connectivity (BT, GSM, USB, WiFi)
• QNX / Android / WinCE
• Connected to CANbus
https://recon.cx/2018/brussels/resources/slides/RECON-BRX-2018-Dissecting-QNX.pdf
In-Vehicle Infotainment system
• Browser -> RCE -> CANbus
• Service @ 0.0.0.0:PORT -> RCE ->
CANbus
• Tesla 3 (Mar 2019, Pwn2Own)
• VAG: Golf GTE, Audi A3 Sportback (2018)
• FCA: Jeep Grand Cherokee (2014)
https://www.bleepingcomputer.com/news/security/volkswagen-and-audi-cars-vulnerable-to-remote-hacking/
Tesla… we need to talk
– https://www.blackhat.com/docs/us-17/thursday/us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-
CAN-Bus-wp.pdf
Designed by Tesla (2016-2017)
• Old QtWebkit
• Linux kernel 2.6.36 w known vulns
• Backdoors, hardcoded passwords (4 diag purpose, obviously)
• SGW boot.img w/o signing and checks
https://keenlab.tencent.com/en/whitepapers/Experimental_Security_Research_of_Tesla_Autopilot.pdf
Designed by Tesla (2016-2017)
https://keenlab.tencent.com/en/whitepapers/Experimental_Security_Research_of_Tesla_Autopilot.pdf
ADAS (advanced driver-assistance systems)
ADAS (advanced driver-assistance systems)
• Tesla autopilot fooled to switch lanes (2019)
https://keenlab.tencent.com/en/whitepapers/Experimental_Security_Research_of_Tesla_Autopilot.pdf
What’s next? (2022)
• Advanced automatic emergency braking systems (AEB) (adversarial examples)
• Lane departure warning systems (adversarial examples)
• Intelligent speed assistance
• Alcohol interlock installation facilitation (integer overflow?)
• Driver drowsiness and attention warning
• Advanced driver distraction warning
• Emergency stop signal (adversarial examples)
• Reversing cameras or detectors (moar sensors sticking out)
• Accident data recorder (full access to all telematics)
Few more things…
• 4G / 5G / Narrow band
• V2V, V2X communications
Side-channel attacks
Car Hacking: Yes, you can do that!
Andrey Voloshin
CTO @ Théa
Alexander Olenyev
Hardware Engineer @ Théa
There is always a place where you feel safe

More Related Content

Similar to Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!

WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
Symantec
 

Similar to Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that! (20)

Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
Auto_Security
Auto_SecurityAuto_Security
Auto_Security
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
 
Yared Hankins Wireless Key
Yared Hankins Wireless KeyYared Hankins Wireless Key
Yared Hankins Wireless Key
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Infographic under the hood of a connected car hack
Infographic under the hood of a connected car hackInfographic under the hood of a connected car hack
Infographic under the hood of a connected car hack
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
IOT Success depends on Integration
IOT Success depends on Integration IOT Success depends on Integration
IOT Success depends on Integration
 
Backdooring a car
Backdooring a carBackdooring a car
Backdooring a car
 
Current state of automotive network security
Current state of automotive network securityCurrent state of automotive network security
Current state of automotive network security
 
Connected Cars Are the Next Must Have Consumer Electronics Device
Connected Cars Are the Next Must Have Consumer Electronics DeviceConnected Cars Are the Next Must Have Consumer Electronics Device
Connected Cars Are the Next Must Have Consumer Electronics Device
 
20181116.smart can cable_v2
20181116.smart can cable_v220181116.smart can cable_v2
20181116.smart can cable_v2
 

More from NoNameCon

Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографіїRuslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
NoNameCon
 
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
NoNameCon
 
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpackingIevgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
NoNameCon
 
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
NoNameCon
 
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameConAlexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
NoNameCon
 
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon WorkshopStas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
NoNameCon
 
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical AccessSerhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
NoNameCon
 
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
NoNameCon
 

More from NoNameCon (20)

Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
 
Anastasiia Vixentael – Encryption basics [NoName CyberKids]
Anastasiia Vixentael – Encryption basics [NoName CyberKids]Anastasiia Vixentael – Encryption basics [NoName CyberKids]
Anastasiia Vixentael – Encryption basics [NoName CyberKids]
 
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
 
Olha Pasko - Hunting fileless malware [workshop]
Olha Pasko - Hunting fileless malware [workshop] Olha Pasko - Hunting fileless malware [workshop]
Olha Pasko - Hunting fileless malware [workshop]
 
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
 
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографіїRuslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
 
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
Oksana Safronova - Will you detect it or not? How to check if security team i...
Oksana Safronova - Will you detect it or not? How to check if security team i...Oksana Safronova - Will you detect it or not? How to check if security team i...
Oksana Safronova - Will you detect it or not? How to check if security team i...
 
Bert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for CybersecurityBert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for Cybersecurity
 
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpackingIevgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
 
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
 
Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?
 
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
 
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
 
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameConAlexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
 
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon WorkshopStas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
 
Serhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security BySerhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security By
 
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical AccessSerhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
 
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
 

Recently uploaded

➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men 🔝pathankot🔝 Esc...
➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men  🔝pathankot🔝   Esc...➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men  🔝pathankot🔝   Esc...
➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men 🔝pathankot🔝 Esc...
nirzagarg
 
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
amitlee9823
 
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men 🔝Bhiwandi🔝 Escor...
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men  🔝Bhiwandi🔝   Escor...➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men  🔝Bhiwandi🔝   Escor...
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men 🔝Bhiwandi🔝 Escor...
amitlee9823
 
Call Girls in Patel Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Patel Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Patel Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Patel Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
ozave
 
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
nirzagarg
 
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
avy6anjnd
 
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
amitlee9823
 
➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men 🔝narsinghpur🔝 ...
➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men  🔝narsinghpur🔝  ...➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men  🔝narsinghpur🔝  ...
➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men 🔝narsinghpur🔝 ...
nirzagarg
 
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...
amitlee9823
 
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
lizamodels9
 
Somya Surve Escorts Service Bilaspur ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Somya Surve Escorts Service Bilaspur ❣️ 7014168258 ❣️ High Cost Unlimited Har...Somya Surve Escorts Service Bilaspur ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Somya Surve Escorts Service Bilaspur ❣️ 7014168258 ❣️ High Cost Unlimited Har...
nirzagarg
 

Recently uploaded (20)

➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men 🔝pathankot🔝 Esc...
➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men  🔝pathankot🔝   Esc...➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men  🔝pathankot🔝   Esc...
➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men 🔝pathankot🔝 Esc...
 
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's Why
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's WhyIs Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's Why
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's Why
 
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
 
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men 🔝Bhiwandi🔝 Escor...
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men  🔝Bhiwandi🔝   Escor...➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men  🔝Bhiwandi🔝   Escor...
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men 🔝Bhiwandi🔝 Escor...
 
(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7
(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7
(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7
 
Call Girls in Patel Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Patel Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Patel Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Patel Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available
8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available
8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available
 
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
 
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
 
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
 
➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men 🔝narsinghpur🔝 ...
➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men  🔝narsinghpur🔝  ...➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men  🔝narsinghpur🔝  ...
➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men 🔝narsinghpur🔝 ...
 
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
 
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
 
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...
 
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
 
Is Your BMW PDC Malfunctioning Discover How to Easily Reset It
Is Your BMW PDC Malfunctioning Discover How to Easily Reset ItIs Your BMW PDC Malfunctioning Discover How to Easily Reset It
Is Your BMW PDC Malfunctioning Discover How to Easily Reset It
 
Somya Surve Escorts Service Bilaspur ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Somya Surve Escorts Service Bilaspur ❣️ 7014168258 ❣️ High Cost Unlimited Har...Somya Surve Escorts Service Bilaspur ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Somya Surve Escorts Service Bilaspur ❣️ 7014168258 ❣️ High Cost Unlimited Har...
 

Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!

  • 1. Car Hacking: Yes, you can do that! Andrey Voloshin CTO @ Théa Alexander Olenyev Hardware Engineer @ Théa
  • 3.
  • 4. Safety • Eat • Move (vehicles are here) • Rave • Sleep • Repeat :)
  • 5. Why you should care • Better place to live • $$$ • Fame • High risk
  • 6. – Anonymous Volunteer Car hacking is about seeking for unusual behaviour
  • 7. –Robert Bates, chief safety officer for automotive at Mentor, a Siemens Business If I am the CEO of General Motors, five years from now the last thing I want to see is an email in my inbox in the morning that says ‘Pay me $2 billion or else all of your cars are going to turn left.’
  • 8.
  • 9.
  • 11. Domains • Physical vulns • Mobile Apps (car alarm/security, remote control, maintenance) • Architectural • Remote compromise via In-Vehicle Infotainment systems (IVI) • ADAS • Shaken, not stirred
  • 12. Physical • Jamming + stealing. Rule them all. (out of scope) • Valuable parts are easily accessible
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Physical. But clever • Find something connected to CANbus • Actuators w ECU (autofolding wind mirrors) • Sensors (radar, parking assist?, cameras?) • Use workshop manuals • Inject messages (impersonate ECUs, open doors)
  • 19.
  • 20. – Yes, suddenly you may need them to drive your car ¯_(ツ)_/¯ Mobile Apps
  • 21. – Wired, 2015 Security researcher Samy Kamkar showed in 2015 that he could use a small piece of hardware hidden on a car to wirelessly intercept credentials from iOS apps like GM's Onstar, Chrysler's UConnect, Mercedes-Benz mbrace, and BMW's Remote. Kamkar's attack similarly allowed him to remotely locate those cars, unlock them, and in some cases start their ignitions.
  • 22. – https://www.troyhunt.com/no-vtech-cannot-simply-absolve-itself/ 2016 Troy Hunt and Scott Helme figured out that the Leaf’s app interface (API) uses only the Vehicle Identification Number (VIN) to control car features remotely without passwords
  • 23. – Researchers at UK-based penetration testing and cybersecurity firm PenTestPartners, 2019 An analysis of the APIs used by the Pandora and Viper mobile apps revealed that they were affected by insecure direct object reference (IDOR) vulnerabilities
  • 24. – Marcus Aurelius, 150 AD OBD devices w BlueTooth connectivity, default PIN and sends custom CAN frames
  • 25. Web attack vectors 1 2 3 4. Aftermarket 1. PKI, secure boot, source codes, backdoors, etc 2. OEM backend infrastructure (including app stores, connected car solutions, IVI backend, databases, documentation) 3. Diagnostic equipment, engineer codes, key duplicates, etc 4. Control car, steal car, dump private data, etc
  • 26. Backend • Misconfiguration, dev/qa/staging env with weak security • Ancient solutions/technologies • Workshop manuals • APIs without security assessments
  • 27. – when something without attention goes wrong Architecture
  • 28.
  • 29. Dump it Security Architect crying right now
  • 30. Immo, $ecurityAccess • Weak challenge-response • JTAG enabled • Secrets stored in unencrypted Flash/ROM (coz there is no other option) • IDA, GHIDRA, radare
  • 31.
  • 32. RF hub in trusted zone • Weak encryption (Tesla’s key fob with 40-bit cipher) — the KU Leuven team discovered in the summer of 2017 • Weak PRNG • Jamming the signal • Relay • Replay rolling codes
  • 33. Key fob hack to unlock 100 million VAG cars // 2016 • With only four unique cryptographic keys used by most of the 100M cars, it means millions and millions of cars will be exposed once a hacker will find one of the four keys. • The research led by Flavio Garcia and David Oswald also refers to the vulnerability of other cars from different automakers. Millions of vehicles from Ford, Nissan, Mitsubishi, Chevrolet, and other marques are vulnerable to a similar attack using a home-made device ($30 SDR).
  • 34. Dale “Woody” Wooden could unlock a Ford vehicle, interfere with its onboard computer systems, and even start its engine. The vulnerability affects the key fobs of 2019 Ford F-150 Raptors and 2019 Ford Mustangs, which use a radio frequency in the lower 900MHz spectrum, and the key fobs of at least one slightly older model, the 2017 Ford Expedition, which uses 315MHz. – https://the-parallax.com/2019/05/03/hacker-ford-key-fob-vulnerability/ May 2019
  • 35. In-Vehicle Infotainment system • Connectivity (BT, GSM, USB, WiFi) • QNX / Android / WinCE • Connected to CANbus https://recon.cx/2018/brussels/resources/slides/RECON-BRX-2018-Dissecting-QNX.pdf
  • 36.
  • 37. In-Vehicle Infotainment system • Browser -> RCE -> CANbus • Service @ 0.0.0.0:PORT -> RCE -> CANbus • Tesla 3 (Mar 2019, Pwn2Own) • VAG: Golf GTE, Audi A3 Sportback (2018) • FCA: Jeep Grand Cherokee (2014) https://www.bleepingcomputer.com/news/security/volkswagen-and-audi-cars-vulnerable-to-remote-hacking/
  • 38. Tesla… we need to talk – https://www.blackhat.com/docs/us-17/thursday/us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To- CAN-Bus-wp.pdf
  • 39. Designed by Tesla (2016-2017) • Old QtWebkit • Linux kernel 2.6.36 w known vulns • Backdoors, hardcoded passwords (4 diag purpose, obviously) • SGW boot.img w/o signing and checks https://keenlab.tencent.com/en/whitepapers/Experimental_Security_Research_of_Tesla_Autopilot.pdf
  • 40. Designed by Tesla (2016-2017) https://keenlab.tencent.com/en/whitepapers/Experimental_Security_Research_of_Tesla_Autopilot.pdf
  • 42. ADAS (advanced driver-assistance systems) • Tesla autopilot fooled to switch lanes (2019) https://keenlab.tencent.com/en/whitepapers/Experimental_Security_Research_of_Tesla_Autopilot.pdf
  • 43. What’s next? (2022) • Advanced automatic emergency braking systems (AEB) (adversarial examples) • Lane departure warning systems (adversarial examples) • Intelligent speed assistance • Alcohol interlock installation facilitation (integer overflow?) • Driver drowsiness and attention warning • Advanced driver distraction warning • Emergency stop signal (adversarial examples) • Reversing cameras or detectors (moar sensors sticking out) • Accident data recorder (full access to all telematics)
  • 44. Few more things… • 4G / 5G / Narrow band • V2V, V2X communications
  • 46. Car Hacking: Yes, you can do that! Andrey Voloshin CTO @ Théa Alexander Olenyev Hardware Engineer @ Théa
  • 47. There is always a place where you feel safe