Hacking cars in JavaScript (Running replay attacks in the browser with the HackRF) | Charlie Gerard | Senior frontend developer & Creative Technologist

Collection of side projects, conference talks and blog posts experimenting with frontend technologies and human-computer interaction

Is it just me, or is the definition of β€œreplay resistant” MFA a little too loose in the PCI 4.0.1 https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0_1.pdf publication?
#mfa #pci #pcidss #replayattack

I'm a huge fan of #biometrics as part of secure #authentication and #authorization, but the dirty little secret no one is talking about (yet) is that the source of compromised #biometricdata can't be changed or replaced. If your system's #secureenclave or #HSM gives up the goods, you can't change your face, fingerprint, or retinal pattern. Such systems need additional safeguards to avoid the biometric version of a #replayattack, ensuring that re-enrollment results in new set of #quantumresistant cryptographic values.

https://venturebeat.com/security/the-password-identity-crisis-evolving-authentication-methods-in-2024-and-beyond/

The password identity crisis: Evolving authentication methods in 2024 and beyond

A future beyond passwords: Key identity management techniques to watch out for in 2024, including passkeys, biometrics and zero trust.

VentureBeat
Unlock Any (Honda) Car (https://hackaday.com/2022/07/08/turns-out-y...

Unlock Any (Honda) Car (https://hackaday.com/2022/07/08/turns-out-you-can-just-unlock-any-honda-car/) image https://hackaday.com/wp-content/uploads/2022/07/hadimg_honda_rollingpwn_feat.png #carhacks #securityhacks #honda #keyfob #replayattack #rollingcode #sdr #hackaday posted by pod_feeder_v2 (https://gitlab.com/brianodonnell/pod_feeder_v2/)

diaspora* social network

Hacker Claims Honda and Acura Vehicles Vulnerable to Simple Replay Attack

Keyless entry has become a standard feature on virtually all cars, where once it was a luxury option. However, it's also changed the way that thieves approach the process of breaking into a car. After recent research, [HackingIntoYourHeart] claims that many modern Honda and Acura vehicles can be accessed with a simple replay attack using cheap hardware.

It's a bold claim, and one that we'd love to see confirmed by a third party. The crux of the allegations are that simply recording signals from a Honda or Acura keyfob is enough to compromise the vehicle. Reportedly, no rolling code system is implemented and commands can easily be replayed.

Given these commands control features like unlocking the doors, opening the trunk, and even remote starting the vehicle, it's a concerning situation. However, it's also somewhat surprising. Rolling code technology has been around for decades, and makes basic replay attacks more difficult. Range extender attacks that target keyfobs sitting inside homes or gas stations are more common these days.

Whether Honda has made a security faux pas, or if there's something more at play here, remains to be seen. If you've got more information, or have been able to recreate the same hack on your own Honda, be sure to let us know.

#carhacks #acura #honda #keyfob #replayattack #rollingcode

Hacker Claims Honda And Acura Vehicles Vulnerable To Simple Replay Attack

Keyless entry has become a standard feature on virtually all cars, where once it was a luxury option. However, it’s also changed the way that thieves approach the process of breaking into a c…

Hackaday
99% of compromised Microsoft enterprise accounts lack MFA - Cybercriminals compromise over a million Microsoft enterprise accounts each month as too few custo... more: https://nakedsecurity.sophos.com/2020/03/09/99-of-compromised-microsoft-enterprise-accounts-lack-mfa/ #multi-factorauthentication #two-factorauthentication #2-factorauthentication #securitythreats #passwordreuse #replayattack #microsoft #office365 #privacy #windows #2fa #mfa
99% of compromised Microsoft enterprise accounts lack MFA

Naked Security