How to Hack a Car: Phreaked Out (Episode 2)
(提示:YouTube 视频,观看需翻墙!)
视频标题:How to Hack a Car: Phreaked Out (Episode 2)
视频标题:国外大牛详细讲解入侵汽车全过程,国外大牛详细讲解如何破解一辆汽车!国外大牛入侵、破解汽车全过程。
视频链接:http://www.youtube.com/watch?v=3jstaBeXgAs
发布日期:2014年5月29日
友情提示:不懂英语?点此翻译为中文!
Click here to watch Episode 3 now! http://bit.ly/1mfBwef
In this episode of "Phreaked Out," we met some of the top security researchers at the center of the car hacking world. The goal isn't to make people crash: They highlight security holes in order to highlight flaws in car technology, intended to pressure auto manufacturers to be a few steps ahead of their friendly foes.
Information security researcher Mathew Solnik gave us a first-hand demonstration on how to wirelessly send commands to the car and remotely tell it what to do. With a little over a grand and about a month of work, Solnik found time outside of his full-time job to reverse-engineer a car's computer system to make it ready for a takeover.
From his laptop, he was able to manipulate the car's engine, brakes and security systems by wirelessly tapping into the Controller Area Network, or CAN bus, network. Without getting too deep into the details—both for legal reasons and due to my own training-wheel knowledge of such things—he was able to do so by implementing some off-the-shelf chips, a third party telematic control unit, a GSM-powered wireless transmitter/receiver setup, and a significant amount of know-how he's accrued over the years.
The reason for such additional hardware was to make our older, mid-sized sedan function like a newer—and arguably more vulnerable—stock vehicle, which these days often come with data connections. (We would have loved to tinker with the latest, most connected car on the market, but since we were on a shoestring budget and it's incredibly hard to find a friend who's willing to lend their car for a hacking experiment, our pickings were slim.)
With that said, a car whose network system is connected to a cloud server and accessible by Bluetooth, cell networks, or wi-fi is potentially vulnerable to intrusion.
Unlocking L.A.'s Traffic Grid: Phreaked Out (Episode 1): http://bit.ly/1r03DpC
How to Hack a Car: Phreaked Out (Episode 2): http://bit.ly/1ps2BB7
All The Ways To Hack Your Phone: Phreaked Out (Episode 3): http://bit.ly/1mfBwef
Subscribe to MOTHERBOARD: http://bit.ly/Subscribe-to-MOTHERBOARD
Follow MOTHERBOARD
Facebook: http://www.facebook.com/motherboardtv
Twitter: http://twitter.com/motherboard
相关内容:
国外大牛入侵破解汽车过程,How to Hack a Car: Phreaked Out (Episode 2)
谁动了我的汽车 - 车联网安全探讨,论如何入侵汽车控制系统,驾驶安全
指纹门控的安全,户外物理设备入侵,如何入侵绕过指纹识别安全锁、门控系统
已更新Iwork10测评!求推荐一款便携式户外物理移动渗透终端设备!!!
户外物理设备入侵之:入侵并“调教”中控指纹语音考勤系统(打卡机)
华裔黑客 BITcrash44 凭借一台 iPhone4 拿下时代广场大屏幕
视频:国外黑客利用一部诺基亚N95手机入侵火车站电子屏,并且现场直播
视频:黑客实战入侵,黑客入侵大楼灯光控制系统,黑客们的游戏,户外物理入侵
留言评论(旧系统):