Flipper Zero CAN Hack Your Car!! CAN Bus Hacking With Flipper Zero!

preview_player
Показать описание
Last week, community member and security researcher Matthew KuKanich made an absolutely amazing presentation on how he, in collaboration with Rabbit Labs created the CAN Comander that allows the Flipper Zero to connect directly to a car's CAN Bus system! Once the Flipper can access the car's onboard computer, it can do just about anything!

-----------------------------------
Check Out The Official Squachtopia Hangout Discord Server!:
-----------------------------------
Support the Channel at my Patreon!!
-----------------------------------
-----------------------------------
Follow me on Social Media!
-----------------------------------

Рекомендации по теме
Комментарии
Автор

🎯 Key points for quick navigation:

00:00 *🛡️ Introduction and Disclaimer*
- The video is for educational purposes only; testing on hardware not owned is illegal,
- Introduction to the topic of auto hacking and the misinformation about Flipper Zero's capabilities.
00:28 *🔑 Understanding Flipper Zero and Car Hacking*
- Flipper Zero can read car keys and fobs but has security limitations,
- Possibility of hacking with additional engineering and technical knowledge.
01:32 *🚗 Introduction to CAN Bus*
- Explanation of CAN Bus as a robust two-wire system for car data transmission,
- Importance of CAN Bus in connecting sensors and devices to the car’s computer.
03:38 *🔧 Interfacing with CAN Bus*
- Tools needed to interface with CAN Bus like MCP2515 and Arduino Nano,
- Introduction to PCB and sponsor PCB Way.
05:00 *📡 Accessing CAN Bus and Database Container Files*
- Multiple ways to access CAN Bus including ODB2 port and lights,
- Explanation of DBC files as translators for commands and their availability.
06:04 *🛠️ Practical Applications of CAN Bus Hacking*
- Use of homemade CAN Bus interface to read car data and create custom displays,
- Examples of interfacing with infotainment systems and digital displays.
07:03 *🖥️ CAN Commander and Flipper Zero*
- Introduction of CAN Commander to interface Flipper Zero with CAN Bus,
- Capabilities of CAN Commander including GPS, Wi-Fi, and reading key fob signals.
08:11 *📶 Advanced Features of CAN Commander*
- Using CAN Commander for denial-of-service attacks and man-in-the-middle attacks,
- Explanation of prioritized packets and potential for disabling vehicles.
09:49 *🔄 Real-World Implications and Security Concerns*
- Potential for manipulating vehicle data for insurance or monitoring systems,
- Examples of existing hacks and the importance of security research.
11:28 *🛡️ Security Research and Preventative Measures*
- Efforts by researchers like Matthew to develop countermeasures against CAN Bus attacks,
- Tips for vehicle owners to protect against hacking and the inevitability of such risks.
12:10 *📢 Conclusion and Call to Action*
- Summary of the video and encouragement to watch the full presentation by Matthew,
- Request for likes, comments, and subscriptions to support the channel.

Made with HARPA AI

warezit
Автор

Thank you so much for bringing this to such a wide audience! I hope everyone enjoys :)

MatthewKuKanich
Автор

Dear Canada, this still doesn't make the Flipper a car hacking device. The Flipper plays a trivial role and could literally be replaced with anything that has buttons and a screen.

jmr
Автор

rabbit labs is just amazing love everything they do. their boards are such high quality that you would think it was machined

FoxyLizzyCC
Автор

All this is why I as a locksmith now have to crawl up in dashboards and floorboards and physically spike into Chrysler star connectors just to program a damn key 😂

aceman
Автор

Good introduction to CAN BUS.
Loved it.

castagniermickael
Автор

Watched Matt's presentation live. Was amazing. SQUATCH LOVE ALL YOUR VIDEOS. please keep up the great work!

neilBradley-vpwh
Автор

With the can bus, almost everything can theoretically be hacked, even elevators

gshockhodinky
Автор

Cool video. I need to be getting me these boards as they could open up diagnostics for me as I’m having some electronics issues. You can hack into rolling code but it’s an impossible scenario. You have to jam the frequency, wait for the person to use their key fob which is being jammed. At the same time you have to be close enough to read the key fob to get the current unused rolling code. Then when they leave you unjam the frequency and replay the signal you captured and it’ll open. If you can do this then you’re defo James Bond or Ethan Hunt 😂

krsb
Автор

As a former Mazda tech, with the OEM OBD2 tools we can do almost anything, change info on display like he did, we can also change things like wiper swipe time, dome light times outs, change instrument cluster values like rpm limits and speed limiting change indicator flasher timing

aidanm
Автор

The term 'bus' in computer architecture refers to a communication system that transfers data between components inside a computer, or between computers. It's not an acronym, but rather a general term that encompasses the hardware (wires, optical fiber, etc.) and software (communication protocols) involved in this data transfer. The Wikipedia article on 'Bus (computing)' provides a good overview of the different types of buses used in computer systems, such as the address bus, memory bus, and expansion buses. It's a useful resource for understanding this fundamental concept in computer architecture.

KernelNinja_
Автор

What I learned in this video, the possibilities are endless! 😊😁

PhilieBlunt
Автор

I worked for a company in a past life as a reverse engineer and we were able to defeat the rolling code issue and was able to make oem style keys that worked just as OEM we even started selling to OEM dealer ships.

We even got the prox stuff working also on just about all males and models of cars.

Lar_ry
Автор

This video is so wildly simplified for what is actually happens. Can we start with "revometer" and tachometer is the same thing only the first doesn't exist. The flipper is a cute lcd, nothing more.

tomamore
Автор

Thanks for the video.
🤫😎I think an entire side business could be made for “content filtering” of acceleration, hard braking and speed. Disabling smart reporting and wiping telematics logs before getting repairs might have potential, too

derbemobile
Автор

I'd be super cool to use the flipper zero as a remote to get one of those badass lawn mowers that looks like an army tank but is a wireless lawnmower and mower the lawn from a chair sitting down or a sofa on your couch.

frankiecal
Автор

great video!! can't wait to hopefully put this to the test at CHV!

emilia
Автор

Hey I just wanted to let you know that I always enjoy your videos. You put so much information in a short time and it always gets me excited about programming and trying to reverse engineer the next technology that otherwise seems impossible. The can bus mod is genius! I have been curious about if there is a list for different key fob codes that show all the different signals and what order they are in. Like something a locksmith or the manufacturer might have for re-programming a key fob. Then someone could just program the flipper as a key fob for a wireless key unlock/start. Wireless keys still trip me out even with the security features because I know when it comes to programming, where there is a will, there is a way! As demonstrated in this video! Keep up the good work man. Thanks!

clmroxk
Автор

I seen your a bike mechanic, are you in Canada? I used to ride for cove bikes in north Vancouver and stayed over there for a bit. Awesome bunch of guys, and amazing mechanics

lewisjonesraglan
Автор

I know a bunch about CAN "bust" and OEM have the option to use crypto CAN, they just don't...

craxxysum