Researcher Samy Kamkar demonstrated the “roll-jam”, a small device which can be made for just $30 and breaks the security on wireless locks, of the sort used in cars and garage door openers. If that’s the case, Defcon has you covered. Cars – again – and garages tooīut maybe you don’t need to remotely hack a car? Maybe you just want to steal yourself a nice pair of wheels. Of course, that’s too late for Chrysler, which is now facing a class-action lawsuit for their failure to protect their cars. It may not sound like the catchiest name, but at Defcon, there’s a sort of prestige in having a vulnerability serious enough that you don’t need to dress it up – and hacking cars definitely counts.ĭemonstrating how to hack a car may appear irresponsible, but it’s in line with the hacker ethos, which says that the more people know about a vulnerability, the more likely it is to get fixed, and the less likely it is to happen again. On Saturday, the pair demonstrated the technical details behind the hack in a talk entitled “Remote exploitation of an unaltered passenger vehicle”. The hack was serious enough that three days later, Fiat Chrysler recalled 1.4m vehicles and updated the software to patch the vulnerability. The big one: in July, security researchers Charlie Miller and Chris Valasek demonstrated their new hack to Wired reporter Andy Greenberg, remotely seizing control of the Jeep he was driving and cutting the accelerator on the highway. Do any of these, and the drone isn’t staying aloft for long. So how do you hack a drone? It’s actually fairly simple, Robinson says: disrupt the Wi-Fi, and seize control of the connection disrupt the GPS that the drone uses to steer, and convince it that it’s in the wrong place or induce a magnetic field to disrupt the gyroscopes it uses to stay stable. And Robinson highlighted more concerning developments, too, such as police drones used to control crowds at protests, and the already infamous handgun-drone demonstrated in July this year. The devices, which are largely unregulated in the US and UK, are the perfect voyeur’s tool: a mobile wireless spy-cam. Robinson’s talk, titled “Knocking my neighbour’s kid’s drone offline”, focused on the privacy reasons for wanting to take down a drone. All of that is done over wi-fi – which introduces the point of attack, according to security researcher Michael Robinson. The small quadcopter can be flown manually or using GPS co-ordinates, and is outfitted with a camera on the front that beams video and still images to the user’s smartphone. The Parrot AR 2.0 Drone is one of the most popular models of recreational drones on the market. We explicitly did this research in order to make the devices safer.” Drones Healey told Wired: “It’s easy to point to this and say, oh it’s just a skateboard, but for people who are buying these boards and commuting on them every day … there is risk obviously associated with that. The attack mimics the interference, blocking the connection between the real controller and allowing the pair to stop a board or even send it flying in reverse. The hack was discovered by Richo Healey, a security researcher for payments company Stripe, and Mike Ryan, a researcher at eBay, following an error in Healey’s board which saw it screech to a halt after interference jammed the connection between the handheld bluetooth controller and the board’s motor. Which is for the best, given that at least one brand’s skateboards can be remotely hijacked, giving the attacker complete control of the motorised board using just a bluetooth connection. Electric skateboards are great fun, but thankfully they’re not (yet) a crucial part of the modern city’s transport infrastructure.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |