Warning! This is how cars are hacked. Just like in Mr Robot.

preview_player
Показать описание
The Mr Robot series with OTW (Occupy the Web) continues. OTW explains how hacks shown in the Mr Robot TV Series actually work (and if they are actually realistic). He compares real world car hacking vs what is shown in the TV series.

// OTW Discount //

// MENU //
00:00 - On This Episode of Hack Like Mr Robot!
00:30 - Welcome Back//OTW
00:45 - The Mr Robot Hack We're Doing
02:05 - Cars Becoming Like Computers
02:43 - Software Defined Radio Is Everywhere!
04:11 - Hardware Used//RTL-SDR
04:31 - Software Used//HDSDR
06:17 - Mr Robot//Car Hacking Strategies
08:21 - SDR//Ukraine Conflict
10:00 - Next Step//Signal Jamming
11:14 - Different SDR Software
12:01 - Osmocom//Generate Jamming Signal
14:26 - Sending Out Jamming Signal
15:03 - Signal Jamming Used to Protect Politicians
17:22 - Which Interface to Use?
18:17 - The HackRF//Pros & Cons
19:54 - Signal Generator Waveform Flags
20:37 - Next Step//Capturing the Signal
22:13 - Next Step//Sending the Signal//Replay Attack
25:45 - Next Step//Connecting to ODB2 Port
27:09 - ODB2 Protocols
28:00 - Car Hacking Research//can-utils
29:10 - Car Simulator//ICSim
30:53 - Starting Simulator
32:10 - Capturing Commands to Start the Car//cansniffer
33:56 - Logging//candump
35:06 - Searching log file for commands
35:42 - Sending command//cansend
37:05 - Mr Robot Hack//Realistic?
39:08 - Metasploit Car Hacking Modules
41:08 - Comment!//Which Hack Next?

// DEVICES //

// Previous Videos in the Series //

// David's SOCIAL //

// Occupy The Web social //

// Occupy The Web books //

// Other books //

mr robot
sdr
car
cars
honda
bmw
mercedes
car jacking
car hacking movies
car hacking device
car hacking village
car hacking app
car hacking tutorial
car hacking defcon
car hacking tools
car hacking village defcon
software defined radio explained
software defined radio hacking
software defined radio transceiver
software defined radio with hackrf
software defined radio linux
software defined radio tutorial
software defined radio (sdr)
software defined radio
rtl sdr
sdr radio
car hack
replay attack
great scott gadgets
software defined radio projects
software defined radio mac
software defined radio academy
information security
darren kitchen
software defined radio raspberry pi
software defined radio (sdr) on android device
rtl sdr hacking
rtl sdr v3
rtl sdr dongle
rtl sdr linux

Disclaimer: This video is for educational purposes only.

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#car #hacking #mrrobot
Рекомендации по теме
Комментарии
Автор

The Mr Robot series with OTW (Occupy the Web) continues. OTW explains how hacks shown in the Mr Robot TV Series actually work (and if they are actually realistic). He compares real world car hacking vs what is shown in the TV series.

// MENU //
00:00 - On This Episode of Hack Like Mr Robot!
00:30 - Welcome Back//OTW
00:45 - The Mr Robot Hack We're Doing
02:05 - Cars Becoming Like Computers
02:43 - Software Defined Radio Is Everywhere!
04:11 - Hardware Used//RTL-SDR
04:31 - Software Used//HDSDR
06:17 - Mr Robot//Car Hacking Strategies
08:21 - SDR//Ukraine Conflict
10:00 - Next Step//Signal Jamming
11:14 - Different SDR Software
12:01 - Osmocom//Generate Jamming Signal
14:26 - Sending Out Jamming Signal
15:03 - Signal Jamming Used to Protect Politicians
17:22 - Which Interface to Use?
18:17 - The HackRF//Pros & Cons
19:54 - Signal Generator Waveform Flags
20:37 - Next Step//Capturing the Signal
22:13 - Next Step//Sending the Signal//Replay Attack
25:45 - Next Step//Connecting to ODB2 Port
27:09 - ODB2 Protocols
28:00 - Car Hacking Research//can-utils
29:10 - Car Simulator//ICSim
30:53 - Starting Simulator
32:10 - Capturing Commands to Start the Car//cansniffer
33:56 - Logging//candump
35:06 - Searching log file for commands
35:42 - Sending command//cansend
37:05 - Mr Robot Hack//Realistic?
39:08 - Metasploit Car Hacking Modules
41:08 - Comment!//Which Hack Next?

// DEVICES //

// Previous Videos in the Series //

// OTW Discount //

// David's SOCIAL //

// Occupy The Web social //

// Occupy The Web books //

// Other books //

Disclaimer: This video is for educational purposes only.

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

davidbombal
Автор

Personally I am glad these are still 40 minutes long and extra informative. Please do not condense them into 20 second shorts like all the other channels are suddenly doing. I hate shorts so much

cipher
Автор

I love this Mr. Robot series! Thanks for making more of these videos David.

vizualyse
Автор

very nice to see this. Well done.

I am a senior cyber security consultant with 25+ years experience. Despite your channel having a beginners focus, it's still enjoyable for us veterans.

Nice thing you are doing here David. The best of luck to you mate.

rezasayadi
Автор

Love the serie, David! Keep them going. I think this is so important in terms of educational purpose and for awareness around the world to let people know how relatively easy it can be with some IT knowledge to hack something, just with the use of a single receiver and a linux distro.

TheOriginalJohnDoe
Автор

OTW's voice is soo soothing, calm and gentle. A master indeed. Thanks David for continuing this series. YOu should have included OTW in the video title tho

rickmens
Автор

Mercedes use two freqs for their keyfobs. The jam portion is tough because the HackRF or other SDRs do not have the power output necessary unless you are literally standing next to the target. The roll + jam method will work but it is a proximity based method. I prefer to use URH to record and analyze signals + replay. As always David another great video.

jasonpitts
Автор

The only series I've been waiting...
It's just amazing....
Respect bombal🤗

cd_x
Автор

One of my senior projects in college was to create a wireless ECU device.

I had so much fun accidentally DoSing the CAN in my car. Your engine sounds really funky when the sensors can’t communicate.

azrnzala
Автор

Fun fact about signal jamming to counter radio controlled IEDs in Afghanistan…our jammers in our trucks actually block the satcom signal we sit on for higher command. We were using that frequency over sat to call in medevacs and one time, we took a casualty and we had to call in a medevac right away. But our ground force commander was getting no dice with the sat comm. comes right up to my truck, flips the switch on the jammer, and finally got higher on the radio. Now, I didn’t know this at the time but everyone around me assumed I did so I got yelled at for having the jammer on when it should have been off. But - the Taliban are very, very, very, smart. It was always a joke they are just a bunch of cavemen in paper sandals and pajamas. Nope. Very intelligent individuals. So when they realized inside our trucks were hammers to jam radio and cell signals to counter their IEDs attack, the Taliban increasingly (and quickly too) moved to using what we call “command detonation” initiation. A physical power crowd that some times ran hundreds and hundreds of feet, sometimes burried under a few inches or maybe even a foot of dirt and would run into an orchard or into a random civilians home and they would sit and wait and remotely set off the IED with a cable that ran all the way to it. We came across a couple of those when I was there along with reverse pressure plate initiations (meaning, releasing the pressure from the plate sets it off - they would put big rocks in the middle of the road knowing we obviously have to move the rock and once it’s lifted up, the IED goes off) and standard pressure plated IEDs. I think we only came across one “RC” IED in 2014 and about 300 yards away I saw a guy in the window banging on his cellphone through my scope looking all confused. I asked to fire on him as I was 100 percent certain he was infact - the trigger man and he was awake too earlier yo be making cellphone calls but was told to let him go. Our jammers 100 percent jammed the signal and would not detonate that IED we found

Kaotix_music
Автор

Commands to figure out what devices are in firmware: dmesg; lsusb -v; lspci -v; ls -lart /dev | tail
If you know that the device is a character device that gives a bit more info. You can also do a deep query on a particular device by id.
On Sparc Solaris there is a dedicated firmware layer that you can enter and depending on the device (if not a laptop) there may be dedicated means of controlling or configuring firmware

RorschachRev
Автор

To filter lsusb results to show only SDRs you could pipe grep (-iF = case insensitive), if "SDR" is included in the product title.
Example: lsusb | grep -iF "sdr"

tacolover
Автор

I bought the RTL-SDR when I saw the video this morning and just got it in the mail. This is easily the coolest thing I've ever done (still a beginner in cs/networking). Thanks for the video, will be purchasing the HackRF One next!

trwork
Автор

I am becoming more and more fan of this YouTube channel, the time they spend is awesome .. so inspirational

subtlethingsinlife
Автор

Connector name is OBD2 (OBDII) and network is CAN-BUS, which is network on which any modern car's ecus communicate between each other.

delijasasevera
Автор

We been waiting eagerly sir the robot. 🤖 keep posting David

esaelvladimir
Автор

Hi David, I retired from my job regarding my health situation, Now I want to start by learning ethical hacking..! Where to start.? 😥

Alsa
Автор

You're my role model as a jnr software engineer, Big Love from Ghana. God bless you.

jnryhawthurs
Автор

My favorite series on YouTube. Thanks so much!

sols.
Автор

Best series on YouTube, educational and very entertaining. Thank you, Mr. Bombal.

MindsetMastery-ju