Hackers remotely hack millions of cars!

preview_player
Показать описание
Sam and his friends hack Scooters, Routers, Domain Providers and lots of cars: Ferrari, Porsche. BMW, Rolls Royce, Kia and many more!

Big thanks to Proton for Sponsoring the video!

// Sam’s SOCIAL//

// David's SOCIAL //

// MY STUFF //

// SPONSORS //

// Menu //
00:00 - Coming up
00:57 - Proton VPN sponsored segment
01:55 - Sam Curry background
04:11 - Big impact vulnerabilities // "Finding out I was hacked"
11:10 - Sam's blogs
11:40 - Hacking Apple for 3 months
13:57 - Red Teamers vs the law
18:40 - Hacking Ferrari, Mercedes, BMW, etc.
27:57 - The dangers of centralized systems
31:13 - Hacking Tesla cars
34:09 - The real threat of hacked vehicles
37:45 - Taking over TLDs // Vulnerable domains
41:38 - Hacking car manufacture domains
45:15 - Growth in cybersecurity
46:41 - Coming from a small town // More opportunities than ever
48:28 - How to get into hacking/cybersecurity
51:43 - Growing from cybersecurity
53:29 - Connect with Sam Curry // Conclusion

Telsa
Ferrrari
Porsche
BMW
Mercedes
Rolls Royce
Kia
Flipper Zero
car hacking
mr robot
sdr
car
cars
auto hacking
kia hacking
ferrari hacking
land rover
hacking
automative hacking
hackers
hacking a car
how to hack a car
hacking keyless entry
hacking cars
wireless car control

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

Disclaimer: This video is for educational purposes only.

#cybersecurity #hack #hacking
Рекомендации по теме
Комментарии
Автор

Sam and his friends hack Scooters, Routers, Domain Providers and lots of cars: Ferrari, Porsche. BMW, Rolls Royce, Kia and many more!


Big thanks to Proton for Sponsoring the video!

// Sam’s SOCIAL//

// David's SOCIAL //

// MY STUFF //

// SPONSORS //

// Menu //
00:00 - Coming up
00:57 - Proton VPN sponsored segment
01:55 - Sam Curry background
04:11 - Big impact vulnerabilities // "Finding out I was hacked"
11:10 - Sam's blogs
11:40 - Hacking Apple for 3 months
13:57 - Red Teamers vs the law
18:40 - Hacking Ferrari, Mercedes, BMW, etc.
27:57 - The dangers of centralized systems
31:13 - Hacking Tesla cars
34:09 - The real threat of hacked vehicles
37:45 - Taking over TLDs // Vulnerable domains
41:38 - Hacking car manufacture domains
45:15 - Growth in cybersecurity
46:41 - Coming from a small town // More opportunities than ever
48:28 - How to get into hacking/cybersecurity
51:43 - Growing from cybersecurity
53:29 - Connect with Sam Curry // Conclusion

Telsa
Ferrrari
Porsche
BMW
Mercedes
Rolls Royce
Kia
Flipper Zero
car hacking
mr robot
sdr
car
cars
auto hacking
kia hacking
ferrari hacking
land rover
hacking
automative hacking
hackers
hacking a car
how to hack a car
hacking keyless entry
hacking cars
wireless car control

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

Disclaimer: This video is for educational purposes only.


#cybersecurity #hack #hacking

davidbombal
Автор

Great interview. My two favorite parts: "it was only available for 10 minutes" yeah right Porsche, and "you might not get arrested" at the end, fun is fun until you end up in jail. We need to make more room for ethical hacking! Sam's work should be celebrated and supported even more than it is.

dbdba
Автор

This has to be one of the coolest interviews so far very fascinating

fokyewtoob
Автор

Currently in a cybersecurity retraining course and this has been very informative. I appreciate the work you do David. Thanks Sam

selskels
Автор

Here in Australia you can find a vehicles VIN number by doing a rego check on the vehicle so you don’t even need to be near that vehicle.

PubRunner
Автор

If the manufacturers get self-driving sorted and with that will come a summons feature, you're potentially looking at the thief having the car come to them.

Hugh_de_Mortimer
Автор

Incredible vid David. It is so interesting how taking the time to understand how these RF devices work it can be trivial to compromise.

mytechnotalent
Автор

Imagine, if you build an license plate scanner, that does an reverse lookup to fetch the VIN number and auto sends commands to every plate scanned.

SarahKchannel
Автор

The other day I saw a video about COX and how they were hacked. A basic flaw in their API or something like that. A developer found it and reported to them... it took them about 3 months but the vulnerability seems to be fixed now... and the guy who found it finally went public with the disclosure.

jorgemtds
Автор

This was super interesting. The more I watch these videos the more I want to learn.

faequeenapril
Автор

That kid spoke words I've never heard before lol. What a fascinating insight as to how these guy's do what they do. Wonderful to listen to.

deckieb
Автор

Such an awesome guest, story, and anything is possible! Happy to hear he was able to see the world! 🎉

dustinhxc
Автор

This is very interesting.
I know the ISP I was with over 5 years ago (might be the same one - not sure) could see how many devices were connected) . When I was speaking to them on the phone setting it up she actually told me as she was monitoring my modem / router from the ISP. I can't remember if it was when I was on ADSL

ChrisFoxtrot
Автор

For hotels & free wifi we don't need to use vpn, using secure dns with our devices encrypts all of our traffic and they cannot know anything. For win 11 the configuration is out of box and encrypts all dns traffic from computer. Same for mac/iphones, we can easily install profile that configures for all traffic coming out of devices.

mikejarsoon
Автор

How can I test this on my car from your blog? Fully remote lock, unlock, engine start, engine stop, precision locate, flash headlights, and honk vehicles using only the VIN number. What app/device did you use?

shibbyshaggy
Автор

I remember reading about a security issue in Tesla where an owner that locked/unlocked their tesla via NFC, automatically opened a Bluetooth backdoor on the car as well, and through this door - which remained open for 130 seconds since the (un)lock action - an attacker could register another tesla key for that car, without the car owner receiving any kind of notification about a new key being registered.

AndreuPinel
Автор

Both inspired AND jealous, Great interview!

metubecm
Автор

2:40 : Wow! That's cool that he did a lot! Thank you for the video upload David!

gamereditorner
Автор

Great content as always!

Many thanks from a big fan of your channel in Tokyo❤️

yoshi
Автор

What about if you have your ISP’s modem set to bridge mode, is that more secure? While it doesn’t have an ip address itself my IPS can still stuff to it by connecting to its MAC address which it uses to authenticate that modem/router on their network. Like reset it or update it.

PubRunner