Podcast Detail

#Shellshock keeps going; Odd #php backdoors? MS15-2 (telnet) details; More 0-days from #Google; #ODB

If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/4317.mp3

Podcast Logo
SANS Daily Network Security Podcast (Stormcast) for Monday, January 19th 2015
00:00

My Next Class

… more classes

Interested in Internet Storm Center stickers? Check here if there are still some available for today.

Spotify spotify logo

Discussion

@Johannes
I believe you're missing two key points in your discussion. First, Forbes target audience will be middle to upper-class who will own or drive one of these newer model vehicles and potentially utilize services where they regularly give others access to their car (valet, cleaning, etc). Second, just like a server back door exploit you described in this same podcast, this service could leave the reprogrammed dongle for someone else to unlock the door, start the engine and be on their way much later (hours to weeks) which would keep the car owner from linking the two events in their mind.
Posted by OBD2 hack not trivial on Mon Jan 19 2015, 21:27
Another thing you can do with that port, without even having to leave the dongle connected permanently, is program additional remote keyfobs that can be used to unlock the car doors in the future. I recently had one of these keyfobs fail, and watched the mechanic connect his computer to that port in order to program the car to accept the replacement keyfob. So physical access to the interior of your car with access to that port is a no-win scenario, basically. If you've ever let a valet park your car, it could be 0wned already.
Posted by justdave on Mon Jan 19 2015, 22:42

New Discussions closed for all Podcasts older than two(2) weeks
Please send your comments to our Contact Form