I’m gonna h4x0r j00r Ferrari


Hacking cars, what next? I have fears for the IPv6 generation (if it every happens), when every toaster and light bulb has an IP address, yeah…I’m gonna hack your house then and make your lights blink.

High-tech thieves are becoming increasingly savvy when it comes to stealing automobiles equipped with keyless entry and ignition systems. While many computer-based security systems on automobiles require some type of key ‘mechanical or otherwise’ to start the engine, so-called ‘keyless’ setups require only the presence of a key fob to start the engine.

The expert gang suspected of stealing two of David Beckham’s BMW X5 SUVs in the last six months did so by using software programs on a laptop to wirelessly break into the car’s computer, open the doors, and start the engine.

Poor Beckham, he got had twice.

I wonder how simplistic the system they are using is? 20 minutes to break the encryption? A simple XOR or something, it must be.

“It’s difficult to steal cars with complex security, but not impossible. There are weaknesses in any system” Tim Hart of the Auto Locksmith Association told the U.K’s Auto Express magazine. “At key steps the car’s software can halt progress for up to 20 minutes as part of its in-built protection” said Hart.

Because the decryption process can take a while ‘up to 20 minutes, according to Hart’ the thieves usually wait to find the car in a secluded area where it will be left for a long period. That is believed to be what happened to Mr. Beckham & the crooks followed him to the mall where he was to have lunch, and went to work on his X5 after it was parked.

I’ve heard an experiment was done by some students at John Hopkins, they connected 16 FPGAs together at a total cost of under $3,500. Texas Instruments provided them with 5 DST tags whose keys they did not know. The 16-way parallel cracker was able to recover all 5 keys in well under 2 hours.

Source: Left Lane News

Posted in: Hardware Hacking

, ,


Latest Posts:


BloodHound - Hacking Active Directory Trust Relationships BloodHound – Hacking Active Directory Trust Relationships
BloodHound is for hacking active directory trust relationships and it uses graph theory to reveal the hidden and often unintended relationships within an AD environment.
SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads


One Response to I’m gonna h4x0r j00r Ferrari

  1. ydef May 15, 2006 at 8:06 pm #

    All the more reason to figure out a way to program your own car alarm, with your choice of encryption algorithim or combination of algorithim’s, since beckham’s beamer’s exemplify how quickly the ‘top of the line’ keyless car alarm becomes 0bsoleted/0wned.