7. . RKE KeeLoq algorithm cracked (2008)
. Passive Keyless entry Keyfob Relay attack (2012)
. Gone in 60 seconds -- Hijacking with Hitag2 (2012)
. Samy's Rolljam -- Drive it like you hacked it (2015)
. BMW ConnectedDrive -- Telematics hacked (2015)
. Mitsubishi Outlander WIFI Hacked -- PenTestPartners (2016)
. 14 vulnerabilities found in BMW connected cars -- KeenLab (2018)
What Hacked ?
8. . Dieter Spaar discovered BMW
ConnectedDrive that allowed him
to remotely open the vehicles lock
. Simulated a mobile network in a
test environment with OpenBSC
. After triggered by a decrypted
SMS message. The vehicle sent a
simple HTTP GET request to the
server, in order to retrieve unlock
command
New trend New hack - 2015
http://tiny.cc/bmwconnectedrive
9. . Mitsubishi Outlander PHEV
Top Selling hybrid SUV. Control
of the car by WiFi access point
. Unique SSID (REMOTEnnaaaa)
Easy to locate on wigle.net. The
Wi-Fi PSK is too short to crack
.Controlling protocols are
reverse engineered. Turn
on/off Air-condition; Heating;
Lights and Alarm !!!
New trend New hack - 2016
http://tiny.cc/pentestpartners-Outlander
12. Features
: Keyless Entrance System
: Keyless Engine Start/Stop
: Bluetooth Low Energy 4.0
: Auto Lock/Unlock Function
: Mobile as Key (Android; Iphone)
: Remote Keys Sharing (20 Users)
18. Internal 3
B T L E - M o d u l e ( C C 2 6 4 0 ) t o
communicate with mobile APP
through 2.4ghz
RF-Module(NXP-61X0915) Emits
unlock/lock cmd to the vehicle.
RF-module vary from different car
models
BTLE-Module (SYD8801) sensor.
2.4GHz BTLE SOC 32-bit ARM
Cortex-M0. Functionality unknown ?
37. . Anmi-Key by request, always left in the car
. Breaking glass by force. Get the Anmi-Key
to ulock the door
. Desolder the Registered Anmi chip and
Mechanical Key put it into a blank key
. Or use self design board to emits unlock
cmd to the vehicle by RF-module
. Start the engine and run away
Old School way
65. BTLE -- Login Protocol
Fetch a random values from Anmi-Key (4 bytes)
Calculate EncryptionCode (Random Value; Secret Key)
Wrap up to make an encrypted login packets
Send to Anmi-Key and Log in (Status 0xAA)
66. Only 1 byte key needed
Login -- Encryption
Arg6 is a Dword random
from fetch random
SecretKey is a fixed random
Dword number from device
Initialization
67. Login Packet:
+0 byte channel 0xA1
+1 short len fixed in 0301: 43 00
+3 short crc16
+5 short protocolver 0301
+7 byte usertype
+8 uchar[16] password
+24 uchar[16] enc_md5_username
+40 uchar[16] enc_md5_imei
+56 uchar[6] enc_advertising_key //ascii
+62 uchar[6] enc_date // YYMMDDHHMMSS
+68 uchar enc_openrssi
+69 uchar enc_lockRssi
What we need is to decrypt only 1 byte
Login -- Encryption
What year now ?
78. Conclusion:
. Security by obscurity !?
. Dont trust the user input
. New trends come with new hacks
. Test the product properly, before going on market