• Guest
HabraHabr
  • Main
  • Users

  • Development
    • Programming
    • Information Security
    • Website development
    • JavaScript
    • Game development
    • Open source
    • Developed for Android
    • Machine learning
    • Abnormal programming
    • Java
    • Python
    • Development of mobile applications
    • Analysis and design of systems
    • .NET
    • Mathematics
    • Algorithms
    • C#
    • System Programming
    • C++
    • C
    • Go
    • PHP
    • Reverse engineering
    • Assembler
    • Development under Linux
    • Big Data
    • Rust
    • Cryptography
    • Entertaining problems
    • Testing of IT systems
    • Testing Web Services
    • HTML
    • Programming microcontrollers
    • API
    • High performance
    • Developed for iOS
    • CSS
    • Industrial Programming
    • Development under Windows
    • Image processing
    • Compilers
    • FPGA
    • Professional literature
    • OpenStreetMap
    • Google Chrome
    • Data Mining
    • PostgreSQL
    • Development of robotics
    • Visualization of data
    • Angular
    • ReactJS
    • Search technologies
    • Debugging
    • Test mobile applications
    • Browsers
    • Designing and refactoring
    • IT Standards
    • Solidity
    • Node.JS
    • Git
    • LaTeX
    • SQL
    • Haskell
    • Unreal Engine
    • Unity3D
    • Development for the Internet of things
    • Functional Programming
    • Amazon Web Services
    • Google Cloud Platform
    • Development under AR and VR
    • Assembly systems
    • Version control systems
    • Kotlin
    • R
    • CAD/CAM
    • Customer Optimization
    • Development of communication systems
    • Microsoft Azure
    • Perfect code
    • Atlassian
    • Visual Studio
    • NoSQL
    • Yii
    • Mono и Moonlight
    • Parallel Programming
    • Asterisk
    • Yandex API
    • WordPress
    • Sports programming
    • Lua
    • Microsoft SQL Server
    • Payment systems
    • TypeScript
    • Scala
    • Google API
    • Development of data transmission systems
    • XML
    • Regular expressions
    • Development under Tizen
    • Swift
    • MySQL
    • Geoinformation services
    • Global Positioning Systems
    • Qt
    • Dart
    • Django
    • Development for Office 365
    • Erlang/OTP
    • GPGPU
    • Eclipse
    • Maps API
    • Testing games
    • Browser Extensions
    • 1C-Bitrix
    • Development under e-commerce
    • Xamarin
    • Xcode
    • Development under Windows Phone
    • Semantics
    • CMS
    • VueJS
    • GitHub
    • Open data
    • Sphinx
    • Ruby on Rails
    • Ruby
    • Symfony
    • Drupal
    • Messaging Systems
    • CTF
    • SaaS / S+S
    • SharePoint
    • jQuery
    • Puppet
    • Firefox
    • Elm
    • MODX
    • Billing systems
    • Graphical shells
    • Kodobred
    • MongoDB
    • SCADA
    • Hadoop
    • Gradle
    • Clojure
    • F#
    • CoffeeScript
    • Matlab
    • Phalcon
    • Development under Sailfish OS
    • Magento
    • Elixir/Phoenix
    • Microsoft Edge
    • Layout of letters
    • Development for OS X
    • Forth
    • Smalltalk
    • Julia
    • Laravel
    • WebGL
    • Meteor.JS
    • Firebird/Interbase
    • SQLite
    • D
    • Mesh-networks
    • I2P
    • Derby.js
    • Emacs
    • Development under Bada
    • Mercurial
    • UML Design
    • Objective C
    • Fortran
    • Cocoa
    • Cobol
    • Apache Flex
    • Action Script
    • Joomla
    • IIS
    • Twitter API
    • Vkontakte API
    • Facebook API
    • Microsoft Access
    • PDF
    • Prolog
    • GTK+
    • LabVIEW
    • Brainfuck
    • Cubrid
    • Canvas
    • Doctrine ORM
    • Google App Engine
    • Twisted
    • XSLT
    • TDD
    • Small Basic
    • Kohana
    • Development for Java ME
    • LiveStreet
    • MooTools
    • Adobe Flash
    • GreaseMonkey
    • INFOLUST
    • Groovy & Grails
    • Lisp
    • Delphi
    • Zend Framework
    • ExtJS / Sencha Library
    • Internet Explorer
    • CodeIgniter
    • Silverlight
    • Google Web Toolkit
    • CakePHP
    • Safari
    • Opera
    • Microformats
    • Ajax
    • VIM
  • Administration
    • System administration
    • IT Infrastructure
    • *nix
    • Network technologies
    • DevOps
    • Server Administration
    • Cloud computing
    • Configuring Linux
    • Wireless technologies
    • Virtualization
    • Hosting
    • Data storage
    • Decentralized networks
    • Database Administration
    • Data Warehousing
    • Communication standards
    • PowerShell
    • Backup
    • Cisco
    • Nginx
    • Antivirus protection
    • DNS
    • Server Optimization
    • Data recovery
    • Apache
    • Spam and antispam
    • Data Compression
    • SAN
    • IPv6
    • Fidonet
    • IPTV
    • Shells
    • Administering domain names
  • Design
    • Interfaces
    • Web design
    • Working with sound
    • Usability
    • Graphic design
    • Design Games
    • Mobile App Design
    • Working with 3D-graphics
    • Typography
    • Working with video
    • Work with vector graphics
    • Accessibility
    • Prototyping
    • CGI (graphics)
    • Computer Animation
    • Working with icons
  • Control
    • Careers in the IT industry
    • Project management
    • Development Management
    • Personnel Management
    • Product Management
    • Start-up development
    • Managing the community
    • Service Desk
    • GTD
    • IT Terminology
    • Agile
    • Business Models
    • Legislation and IT-business
    • Sales management
    • CRM-systems
    • Product localization
    • ECM / EDS
    • Freelance
    • Venture investments
    • ERP-systems
    • Help Desk Software
    • Media management
    • Patenting
    • E-commerce management
    • Creative Commons
  • Marketing
    • Conferences
    • Promotion of games
    • Internet Marketing
    • Search Engine Optimization
    • Web Analytics
    • Monetize Web services
    • Content marketing
    • Monetization of IT systems
    • Monetize mobile apps
    • Mobile App Analytics
    • Growth Hacking
    • Branding
    • Monetize Games
    • Display ads
    • Contextual advertising
    • Increase Conversion Rate
  • Sundry
    • Reading room
    • Educational process in IT
    • Research and forecasts in IT
    • Finance in IT
    • Hakatonas
    • IT emigration
    • Education abroad
    • Lumber room
    • I'm on my way

Due to a vulnerability in the Tesla electric vehicle protection system, you can steal the car in a few seconds

Due to a vulnerability in the Tesla electric vehicle protection system, you can steal the car in a few seconds  
Electronic key Tesla
 
 
Tesla's electric vehicles can rightly be called a computer system, not a car. These machines are simply stuffed with electronics. Part of the electronic components are designed to prevent the theft of the machine, and the Tesla security system is considered quite serious. Electric cars regularly receive security updates, which improves the security of the vehicle.
 
 
But a few days ago a group of information security specialists showed that there is no need to break into a closed door - there is a fairly simple way to bypass protection. It's about the model Tesla Model S, a keychain which can simply be copied (not the keychain itself, but its digital imprint), open an electric car and leave. The method is not new, but few expected it to be applied to the latest developments of Tesla.
 
introduced new systems type "anti-shattering" for Model S, which allow you to set the PIN on the car control panel. Without the correct code, the car simply does not go anywhere. According to representatives of Tesla, electric cars produced after June of this year already do not have the vulnerability, which was mentioned above. In particular, the company was able to improve the cryptographic protection of the key, so to decrypt the obtained data now, if possible, but not using the method described above.
 
 
Nevertheless, network security experts believe that if the PIN is not installed, the car can still be hijacked - sooner or later the method of hacking and current cryptography will be developed.
 
 
As for the key itself, the principle of its operation is similar to that of the keys of many other cars with an automatic ignition system. The key sends a radio signal with the code that is received by the car. Further, if the cryptographic key is correct, the ignition system works and the owner sits in the already wound up car.
 
 
In 2017 year was , that the protection of the key is weak, the key is 40-bit, and it can be hacked. It is worth noting that to obtain this information enthusiasts had to spend nine months on reverse engineering. The researchers found that when you receive two codes from any of the keys, you can try to find the right key until the car opens. Then the researchers calculated all possible combinations of key pairs and created a database of 6 terabytes in size. With these data, hackers learned to select the required key in just 1.6 seconds.
 
 

 
The craftsmen showed the possibilities of the developed method using the example of a proof-of-concept attack. The equipment created by them consists of such elements as Yard Stick One, Proxmark, Raspberry Pi minicomputer and a number of additional elements like portable HDDs and batteries.
 
 
The first step is getting the ID of the Tesla target system. The car transmits the signal all the time. Then the researchers reproduce the signal within a meter of the owner of the machine with the key. The latter responds with a digital signal that is recorded. Well, the last stage is the selection of the required pair of keys in the database, which was mentioned above. Once the selection is completed, the car can be opened.
 
 
Researchers reported on their experience of Tesla in 201? after which they received $ 1?000 as a bug bounty. Why was the message about the problem spread only now? The fact is that Tesla fixed the problem only in June, and only after that it became possible to disclose all the details.

It may be interesting

  • Comments
  • About article
  • Similar news
DanielMcMahon 13 September 2018 10:08
Well done! The new world are sitting tight for you, keep it up, sparkling like a star. Extremely brilliant news to finding out about you that you affirmation in EA sports where i need an essay written and it has been exceptionally respectable and feel glad. Visit impact and persevering is gone be winning part.
gayathri 1 February 2019 15:17
The good thing in multiplayer battle is that you win this battle on skills but generator plays a good role by providing you awesome weapons. pixel gun 3d hack app

weber

Author

12-09-2018, 14:13

Publication Date

Development / Programming

Category
  • Comments: 2
  • Views: 2 315
How do you like it, Ilon Musk: BMW and
California police for 7 minutes tried
Tesla delivered a quarterly record for
Statistics from the owner Tesla Model S
Tesla will build a factory in China,
Tesla Inc has opened the possibility of
Write a comment
Name:*
E-Mail:


Comments
Global Dezigns is a Website Development Company in Karachi, Providing services of
website design in karachi
. We are delivering the best partnership across Pakistan. provides a complete range of web development services including web applications, website hosting and maintenance, domain registration, on-page search engine optimization, and website integration with social media platforms such as Facebook, Twitter, LinkedIn, Google Maps, and Google Local Directory. We believe we are well placed to take our knowledge and expertise to the logical next level with the latest web standards.  
  Show/hide text
https://www.globaldezigns.com/



Yesterday, 22:45

mike tomlin

This blog is really great. The information here will surely be of some help to me. Thanks!.mastering physics

Yesterday, 17:57

raymond weber

Coinyspace is the cryptocurrency community and trading forum where members can find any contributors of crypto ecosystem like currencies, exchanges & merchants. Check Out: Bitcoin Merchants
Yesterday, 16:57

noorseo

This is a great high resolution screen which you have shared for the users. Making a website is not an easy task but managing a good website is really a hard work. As far as this website is concerned, I am very happy.https://19216801.1
Yesterday, 16:01

nushra45

i'm satisfied to deem this make recognized Very beneficial for me, as it contains lot of advice. I usually favor to buttonhole The excellent and glad i found this count number in you assertion. thanks Subliminal Hypnosis
Yesterday, 14:56

jahangirkhatri

Adv
Website for web developers. New scripts, best ideas, programming tips. How to write a script for you here, we have a lot of information about various programming languages. You are a webmaster or a beginner programmer, it does not matter, useful articles will help to make your favorite business faster.

Login

Registration Forgot password