$30 device defeats almost any keyless car or garage door

blankslate

Diamond Member
Jun 16, 2008
8,780
559
126
yeah, after the other story about keyless fobs being amplified to unlock car doors I started just unlocking the car door with the key and not using the wireless unlock button but only the wireless lock button.

Usually I just lock and unlock the other doors with the button on the driver's side door and use the key to unlock the driver's side door.


....
 

John Connor

Lifer
Nov 30, 2012
22,757
618
121
Time to use a one time code pair. i.e Send a coded pulse, the car or garage door will expect a different coded pulse the next time based on a preprogrammed algorithm. Kinda like how a one time pad works. https://en.wikipedia.org/wiki/One-time_pad

48690 73784 83390 50280 73205 59245 29411 45509 14146 46531
43715 35289 43193 72421 95498 91988
 
Last edited:

sourceninja

Diamond Member
Mar 8, 2005
8,805
65
91
Time to use a one time code pair. i.e Send a coded pulse, the car or garage door will expect a different coded pulse the next time based on a preprogrammed algorithm. Kinda like how a one time pad works. https://en.wikipedia.org/wiki/One-time_pad

48690 73784 83390 50280 73205 59245 29411 45509 14146 46531
43715 35289 43193 72421 95498 91988

Which is kinda how I thought they worked, I'm a little disappointed.
 

John Connor

Lifer
Nov 30, 2012
22,757
618
121
I always knew that car's and garage's had a code, but never a one time code. I think it was a movie that I saw where they used something like this to steal a nice car.
 

ussfletcher

Platinum Member
Apr 16, 2005
2,569
2
81
Time to use a one time code pair. i.e Send a coded pulse, the car or garage door will expect a different coded pulse the next time based on a preprogrammed algorithm. Kinda like how a one time pad works. https://en.wikipedia.org/wiki/One-time_pad

48690 73784 83390 50280 73205 59245 29411 45509 14146 46531
43715 35289 43193 72421 95498 91988

Thats exactly how it works, https://en.wikipedia.org/wiki/Rolling_code. This device doesn't exploit any vulnerabilities in the crypto systems of cars/garages its a purely physical access attack, relaying the actual challenge/response with a more powerful transmitter. In essence, this is a dumb attention grab.


For those that didn't read the article/attend the talk... The device jams the original key fob signal and then stores and forwards that signal. Only the car/key fob are aware of the legitimate code that will open the car. This device simply relays the working code, while blocking it from the key fob. Once the car accepts this valid code, the code rotates and the device is useless until intercepting the next valid code. Again, in essence it requires being somewhere in close proximity to someone trying to open their car door, then running as fast as you can to beat them inside of it, as that is all this is good for.
 
Last edited:

McWatt

Senior member
Feb 25, 2010
405
0
71
Apparently most of you didn't read the article. I'll quote:

Car makers came up with "rolling code" after thieves figured out how to wirelessly steal codes from early keyless devices. The system works by changing the passkey every time you use a fob, preventing it from being used a second time. In theory, that makes any stolen code useless to an attacker. As with many of his hacks, Kamkar's workaround is simple yet ingenious. Rolljam blocks the remote signal from reaching the vehicle with a pair of radios, then uses a third one to record the wireless code.

Naturally, the mark will try to use the fob again, and once again, Rolljam will jam the signal and steal the second code. But this time, Kamkar's device will re-transmit the first code and unlock the car, so the victim thinks everything's alright. Since your vehicle didn't receive the second code, however, it can now be used by a thieves to steal your car anytime they want. If the device is placed in proximity of a car or garage, it can keep stealing and retransmitting codes, ensuring it always has a fresh, working one.