• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Unpatched Exploit Lets You Clone Key Fobs and Open Subaru Cars

October 13, 2017 by Jonathan Duani 1 Comment

I thought this was super cool and since I own one of the affected years part of me really wants to build out what they are talking about and try it. ( i already have all the comments that are needed). This article talks about how there is an exploit in specific model year Subarus that can cause you to capture the FOB packets and then with a simple script  you are able to unlock and relock the car. Subaru claims they are aware of this issue but have no done anything about it. I also wanted to note that even though I do own one of the effected cars at this point nothing on that car is stock including the alarm so the chances of this actually working for myself are slim because the OEM system is bypassed but it is still cool to give it a try.

 

https://www.bleepingcomputer.com/news/security/unpatched-exploit-lets-you-clone-key-fobs-and-open-subaru-cars/

Filed Under: Week 07: NetCat and HellCat Tagged With:

Reader Interactions

Comments

  1. Younes Khantouri says

    November 9, 2017 at 8:06 pm

    Jonathan,
    Very interesting topic reminds us again with the fact that we became living with so much technology that put as under risk of losing our belongs. On the top of securing our homes that contain nowadays all these devices we call them smart and connected to the internet, now we have to worry about our cars just because they are full of computers and software what don’t get patched by the companies. In my opinion, these companies need to think about inversting on securing these computer technologies before they implement them in cars. However,it become necessary that they work on developing new updates all the time.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in