Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Why would you need such a stack? Article is analyzing unidirectional fobs, HackRF is half duplex so you could easily capture and analyze and/or replay the signal. Only additional thing you need is a PC.

One thing to consider is that the payload will be encrypted so you wont be really able to tell apart what is the rolling code. Hopefully fobs have stronger encryption so collecting enough sniffs and analyzing is insufficient (looking at tesla with their 64bit encryption, hopefully they upgraded).

Honda replay myth mentioned in the article is BS, it was popularized by ppl faking a simple replay attack while doing a more complicated one. If you record the fob command and the car never receives it, of course you can immidiatly after replay it to the car and car will accept it since RC is valid. But if you're sniffing while car is receiving it, RC gets updated. If Honda didn't have RC, it would have been far worse than the KIA boys (overriding immobilizer protection and hotwiring the car) issue that did a lot of damage to KIA in US.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: