Rolling code: Difference between revisions

Content deleted Content added
Added vulnerability
Sissssou (talk | contribs)
Line 27:
 
== Vulnerabilities ==
A rolling code transmitted by radio signal that can be intercepted can be vulnerable to falsification. In 2015, it was reported that [[Samy Kamkar]] had built an inexpensive electronic device about the size of a wallet that could be concealed on or near a locked vehicle to capture a single keyless entry code to be used at a later time to unlock the vehicle. The device transmits a jamming signal to block the vehicle's reception of rolling code signals from the owner's fob, while recording these signals from both of his two attempts needed to unlock the vehicle. The recorded first code is forwarded to the vehicle only when the owner makes the second attempt, while the recorded second code is retained for future use. Kamkar stated that this vulnerability had been widely known for years to be present in many vehicle types, but was previously undemonstrated.<ref name="RollinCode">{{cite news | title=A hacker made a $30 gadget that can unlock many cars that have keyless entry | url=http://www.techinsider.io/samy-kamkar-keyless-entry-car-hack-2015-8?utm_source=feedly&utm_medium=webfeeds%20 | work=[[Tech Insider]] | first=Cadie | last=Thompson | date=2015-08-06 | accessdate=2015-08-11}}</ref> A demonstration was announceddone forduring [[DEF CON]] 23.<ref name="DC23">{{cite web | title=Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars | url=https://www.defcon.org/html/defcon-23/dc-23-speakers.html#Kamkar | work=[[DEF CON]] 23 | first=Samy | last=Kamkar | date=2015-08-07 | accessdate=2015-08-11}}</ref>
 
== References ==