Car and Driver: Looks like the S is on the list of easily hackable key encryption
#1
Registered User
Thread Starter
Car and Driver: Looks like the S is on the list of easily hackable key encryption
http://blog.caranddriver.com/hackers...25-automakers/
It doesn't go into detail as to how one could exploit this hack like it does in this one: http://blog.caranddriver.com/hacker-...ess-entry-car/
For example, could this hack only be exploited if you used your keyless FOB, or could some guy be hiding in the bushes as you insert your key into your ignition?
It doesn't go into detail as to how one could exploit this hack like it does in this one: http://blog.caranddriver.com/hacker-...ess-entry-car/
For example, could this hack only be exploited if you used your keyless FOB, or could some guy be hiding in the bushes as you insert your key into your ignition?
#3
Registered User
Thread Starter
#4
Originally Posted by S2K Al' timestamp='1440121082' post='23721436
Or they just cut through the softop on 90% of our cars.
#5
Registered User
I've known about the way it works for some time. I think that the car will recognize the next 128 or 256 codes, or something like that.
So, if you press your button too many times away from the car, it would need reprogramming.
I would call this an application of an exploit that has been known about in some circles for a long time. It doesn't seem to be a way past the expensive KEY (not fob) programming, sadly.
So, if you press your button too many times away from the car, it would need reprogramming.
I would call this an application of an exploit that has been known about in some circles for a long time. It doesn't seem to be a way past the expensive KEY (not fob) programming, sadly.
Thread
Thread Starter
Forum
Replies
Last Post