1. Welcome to Tacoma World!

    You are currently viewing as a guest! To get full-access, you need to register for a FREE account.

    As a registered member, you’ll be able to:
    • Participate in all Tacoma discussion topics
    • Communicate privately with other Tacoma owners from around the world
    • Post your own photos in our Members Gallery
    • Access all special features of the site

3rd Gen Wireless Key Fob Hacking

Discussion in '3rd Gen. Tacomas (2016-2023)' started by tacitos, Oct 14, 2016.

  1. Oct 16, 2016 at 9:26 AM
    #61
    Spare Parts

    Spare Parts Well-Known Member

    Joined:
    Sep 9, 2016
    Member:
    #196811
    Messages:
    13,810
    Southern Maine
    Vehicle:
    2022 Off Road Premium 4Runner Lunar Rock
    Although I don't disagree with what your saying, but if I understood the article correctly it's about using a signal "repeater" or "strengthener". It's like putting a bridge in for the wifi. No hacking really needed.

    FYI, manual transmission are still keyed from what I understand, i will know for sure in under two weeks
     
    gpb likes this.
  2. Oct 16, 2016 at 9:40 AM
    #62
    Holdfast4

    Holdfast4 Well-Known Member

    Joined:
    Jun 20, 2016
    Member:
    #190127
    Messages:
    66
    Gender:
    Male
    First Name:
    Gord
    Alberta
    Vehicle:
    2016 TRD Sport DCSB 4X4 MT
    FYI, manual transmission are still keyed from what I understand, i will know for sure in under two weeks[/QUOTE]

    My 2016 manual transmission has the ignition keyed but the door locks work remotely. As you stated, I don't believe there was a "smart key" option for it.
     
    Spare Parts likes this.
  3. Oct 16, 2016 at 9:41 AM
    #63
    Spare Parts

    Spare Parts Well-Known Member

    Joined:
    Sep 9, 2016
    Member:
    #196811
    Messages:
    13,810
    Southern Maine
    Vehicle:
    2022 Off Road Premium 4Runner Lunar Rock
    My 2016 manual transmission has the ignition keyed but the door locks work remotely. As you stated, I don't believe there was a "smart key" option for it.[/QUOTE]

    So will I have to push a button or something to unlock, or just be able to open with the key in pocket like the autos?
     
  4. Oct 16, 2016 at 9:51 AM
    #64
    Holdfast4

    Holdfast4 Well-Known Member

    Joined:
    Jun 20, 2016
    Member:
    #190127
    Messages:
    66
    Gender:
    Male
    First Name:
    Gord
    Alberta
    Vehicle:
    2016 TRD Sport DCSB 4X4 MT
    Either or. The driver's door can still be locked/unlocked using the key if you want or you can push the fob button. I just read an article in an online paper that was discouraging use of the remote function for the reasons discussed in this thread. I tend to think the the odds of having my truck stolen in this manner are slim but of course they aren't zero.
     
  5. Oct 16, 2016 at 9:59 AM
    #65
    The hammer

    The hammer Who’s the Wrench?

    Joined:
    Mar 7, 2016
    Member:
    #180475
    Messages:
    3,880
    Gender:
    Male
    Vehicle:
    '16 Tacoma SR5 4X4 DCLB TSS Pkg 17X8" BSW-Cooper DIscoverer AT3 4s P265/65/17
    Underworld Flex trifold, tinted, TRDPRO grill, TRDPRO shift knob, etc,etc
    Nah, sorry I'm not biting on this article it can't be done the way they say because the in-vehicle ecm is a protected network.
    The only way to access it is by following a specific set of instructions to initialize the initial communication sequence between fob and ecm, and it can't be interrupted by anything else going on, or it will void the initialization, so NO it's not happening that way.

    But if you valet park your vehicle and the thief is a valet with the necessary knowledge, then yes any vehicle including those with keys are at risk.
    And btw, I never valet park any of my vehicles, I'd rather walk.

    Plus is good and healthy for you to walk, trust me on this! :thumbsup:

    Hope that helps
    Cheers!
     
    Last edited: Oct 16, 2016
    Spare Parts likes this.
  6. Oct 16, 2016 at 11:43 AM
    #66
    Spare Parts

    Spare Parts Well-Known Member

    Joined:
    Sep 9, 2016
    Member:
    #196811
    Messages:
    13,810
    Southern Maine
    Vehicle:
    2022 Off Road Premium 4Runner Lunar Rock
    I hate any one driving my vehicle, it sucks getting the seat just right, or the seat just being too dam close to even get in. Oh and I know how I would drive and expect others would do the same and that's just not good.
     
    The hammer[QUOTED] likes this.
  7. Oct 16, 2016 at 11:51 AM
    #67
    The hammer

    The hammer Who’s the Wrench?

    Joined:
    Mar 7, 2016
    Member:
    #180475
    Messages:
    3,880
    Gender:
    Male
    Vehicle:
    '16 Tacoma SR5 4X4 DCLB TSS Pkg 17X8" BSW-Cooper DIscoverer AT3 4s P265/65/17
    Underworld Flex trifold, tinted, TRDPRO grill, TRDPRO shift knob, etc,etc
    Well yes there is that, but that and it being stolen as mentioned above is the least of my concern as the insurance will cover it, albeit for an increase in my premium of course, but what I hate is what they do to them that causes expensive repairs (later down the line) NOT covered by insurance.

    When I was a teen I worked part time to put myself thru-school and I know know what those guys did to the vehicle drivetrains every summer!

    Hope that helps
    Cheers!
     
    Spare Parts[QUOTED] likes this.
  8. Oct 16, 2016 at 12:46 PM
    #68
    DaveInDenver

    DaveInDenver Not Actually in Denver

    Joined:
    May 18, 2013
    Member:
    #104390
    Messages:
    3,618
    Gender:
    Male
    First Name:
    David
    Grand Junction
    Vehicle:
    2008 Super White TRDOR AC 6MT
    Unexceptional
    Are you referring to the CAN bus? That's not typically encrypted traffic. Maybe you're saying it's because the protocol requires authentication to be accepted as valid data, which means the device must have the right identifiers.

    But that's not what is being bounced around here. This is the RFID side of the key fob (and TPMS as well FWIW), which once hacked would be sending completely valid commands to the ECU or other microprocessors.

    Unless you're saying that the challenge-response inherent with KeeLoq is what prevents unauthorized access. This is exactly what helped them crack it, the identify-friend-or-foe (e.g. IFF) handshaking when they did the side channel analysis. That's how they were able to figure out the secret keys. Read those differential power analysis papers, it was fairly trivial to do power-vs-response correlation after the algebraic methods had figured out the basic algorithm.

    In particular this paper: https://www.iacr.org/archive/crypto2008/51570204/51570204.pdf
     
  9. Oct 16, 2016 at 12:49 PM
    #69
    tacoflavoredkisses1

    tacoflavoredkisses1 Well-Known Member

    Joined:
    Apr 10, 2016
    Member:
    #183838
    Messages:
    2,564
    Vehicle:
    16 TRDOR DCSB (SOLD)
    I'm not sure that would matter. You could look at it this way. Bob yells a password to Adam. Adam unlocks the doors if the password matches. Bob and Adam have agreed that they will use a random number generator that only they know about to create the passwords. So, when Bob yells the next random number; Adam also knows the same random number. If Edith sits between Bob and Adam and listens to the passwords go back and forth, she would only ever have the old passwords. She would *still* be unable to open the door, because she wouldn't know the next random numbers/password. Knowing the old passwords doesn't help you guess the new ones (theoretically).

    DaveInDenver posted some great info that I still haven't read through yet. He indicated that some of the older methods used weak "seeding" and/or algorithms with too many fixed numbers and not enough randomness. To put it in terms of the analogy I used above, that would be like Adam and Bob using a random number generator based on their birthdays. Edith, knowing their b-days, could start to guess how their generator works and figure out their "random" numbers.
     
    DaveInDenver likes this.
  10. Oct 16, 2016 at 12:54 PM
    #70
    The hammer

    The hammer Who’s the Wrench?

    Joined:
    Mar 7, 2016
    Member:
    #180475
    Messages:
    3,880
    Gender:
    Male
    Vehicle:
    '16 Tacoma SR5 4X4 DCLB TSS Pkg 17X8" BSW-Cooper DIscoverer AT3 4s P265/65/17
    Underworld Flex trifold, tinted, TRDPRO grill, TRDPRO shift knob, etc,etc
    Not talking about CAN bus traffic here because it doesn't need encryption as is hardwired to the ecm like a local Ethernet network would be. The communication protocol has to be initiated with-inside the vehicle under a specific set of commands with nothing else going on as it would be if someone was trying to hack in from the outside, as it would be voided. Not happening on a Toyota.
     
  11. Oct 16, 2016 at 12:56 PM
    #71
    Spare Parts

    Spare Parts Well-Known Member

    Joined:
    Sep 9, 2016
    Member:
    #196811
    Messages:
    13,810
    Southern Maine
    Vehicle:
    2022 Off Road Premium 4Runner Lunar Rock
    Nice example, dam Edith sticking her noise in the middle of shit. Honestly I don't have a clue, but what I got out of the article was they are using a device to lengthen or strengthen the signal, nothing about about needing to code it or what not. So Edith would be holding a microphone next to Adam and/or Bob.
     
    Last edited: Oct 16, 2016
    DaveInDenver likes this.
  12. Oct 16, 2016 at 12:57 PM
    #72
    DaveInDenver

    DaveInDenver Not Actually in Denver

    Joined:
    May 18, 2013
    Member:
    #104390
    Messages:
    3,618
    Gender:
    Male
    First Name:
    David
    Grand Junction
    Vehicle:
    2008 Super White TRDOR AC 6MT
    Unexceptional
    @tacoflavoredkisses1, the only weakness in your analogy would be Edith wouldn't have to know how Bob and Adam generated their passwords if neither knew she was there acting like a repeater. All she's doing is passing valid data between two end users that don't any better. The intermediary would only be retransmitting a bitstream but not actually decoding anything. If you take Bob or Adam out of the equation then the remaining party would be one hand clapping. That's why hiding the fob stops this type of very rudimentary attack, the blockchain is broken. If you don't have the key fob then you need to actually know how to generate valid keys.
     
    Last edited: Oct 16, 2016
  13. Oct 16, 2016 at 1:35 PM
    #73
    gpb

    gpb Well-Known Member

    Joined:
    Aug 24, 2016
    Member:
    #195408
    Messages:
    6,177
    Gender:
    Male
    Atlanta
    Vehicle:
    2017 White DCSB TRDOR 4x4
    You either didn't read the article, or you didn't understand what's going on.

    They're using a dual-device relay; one near enough to the fob to Tx/Rx with it, another near enough the vehicle to Tx/Rx. Signals from the fob/vehicle are relayed to one another. No hacking, no cracking, just relaying the radio signals. Encryption is irrelevant. Rolling codes are irrelevant. The vehicle is communicating with its known fob via the relays and is fooled into thinking the fob is at and inside the vehicle.

    As to it being a "serious problem"... I don't believe that to be the case for most people.
     
    DaveInDenver likes this.
  14. Oct 16, 2016 at 1:55 PM
    #74
    The hammer

    The hammer Who’s the Wrench?

    Joined:
    Mar 7, 2016
    Member:
    #180475
    Messages:
    3,880
    Gender:
    Male
    Vehicle:
    '16 Tacoma SR5 4X4 DCLB TSS Pkg 17X8" BSW-Cooper DIscoverer AT3 4s P265/65/17
    Underworld Flex trifold, tinted, TRDPRO grill, TRDPRO shift knob, etc,etc
    Even if the vehicle is communicating with its known fob via the relays and is fooled into thinking the fob is at and inside the vehicle, it could not be used later or next time without the owner using it (his fob) as each transmitter has to be logged by the ecm as an authorized transmitter during a sequence of events that must happen during the transmitter initialization and authorization process, so encryption and rolling codes are very relevant to preventing unauthorized use.

    Edit: This is why the would be thief would need access to the vehicle, to initialize and authorize a new transmitter.

    Hope that helps
    Cheers!
     
  15. Oct 16, 2016 at 2:13 PM
    #75
    Riding Dirty

    Riding Dirty Sinner; saved by grace

    Joined:
    May 27, 2016
    Member:
    #188065
    Messages:
    2,391
    Vehicle:
    Before: '16 TRD OR 4x4 AC QS//After: 17 T4R Pro 040
    PlastiDip
    Not worried or tore up here, just like more basic tech, not a fan of the latest and greatest tech that comes out every few months. Some people like it, and that's ok. And if someone's gonna steal my truck, they will do so however they can, and I have insurance that will cover it. But I just want to keep from going thru the hassle if I can.
    But, I have learned a lot from you guys' informative posts above. I like learning everything I can, if no other reason than to broaden my knowledge base.
     
    gpb likes this.
  16. Oct 16, 2016 at 5:03 PM
    #76
    jmdwifi

    jmdwifi My Inferno

    Joined:
    Sep 4, 2013
    Member:
    #111848
    Messages:
    310
    Gender:
    Male
    First Name:
    John
    Fredericksburg, Virginia
    See profile
    What I think about this situation.
    I have Allstate
    What I learned on this thread
    The spare FOB is in sleep mode now, so the battery will last longer.
    Thank you
     
  17. Oct 16, 2016 at 5:09 PM
    #77
    over60

    over60 Over70 & still a "Grumpy Old Guy"

    Joined:
    Oct 20, 2010
    Member:
    #44995
    Messages:
    4,791
    Gender:
    Male
    First Name:
    John
    Muskoka, Ontario
    Vehicle:
    2016 Inferno (Punkin) TRD 4X4 Sport DCLB w/upgrade & tech pkg..!!
    Toyota running boards/Solid Fold 2.0/custom stickers/Anti-Dark LED light under hood/Derped grill/Scoop, etc.
    How is the sleep mode activated again.??
     
  18. Oct 16, 2016 at 5:32 PM
    #78
    Spare Parts

    Spare Parts Well-Known Member

    Joined:
    Sep 9, 2016
    Member:
    #196811
    Messages:
    13,810
    Southern Maine
    Vehicle:
    2022 Off Road Premium 4Runner Lunar Rock
    Near the bottom of page

    image.jpg
     
  19. Oct 16, 2016 at 5:42 PM
    #79
    gpb

    gpb Well-Known Member

    Joined:
    Aug 24, 2016
    Member:
    #195408
    Messages:
    6,177
    Gender:
    Male
    Atlanta
    Vehicle:
    2017 White DCSB TRDOR 4x4
    I'm no expert at auto theft, but I imagine the thieves either don't care (sending to chop shop or sending overseas and a new ECM is a fraction of the value of the stolen car) and they need only drive it to their lair, or they could potentially use the relay to present an existing fob while coding a new fob to the car in situ and drive off with that new fob. http://www.dailymail.co.uk/sciencet...h-cars-without-keys-thieves-driving-seat.html
     
  20. Oct 16, 2016 at 7:35 PM
    #80
    tacitos

    tacitos [OP] Tah-Key-Toes

    Joined:
    Nov 16, 2015
    Member:
    #169837
    Messages:
    1,772
    Gender:
    Male
    Vehicle:
    16 TRDORDCLBJBL
    For you guys knocking the article, I merely put this in as reference to help those who know nothing about this and can get an idea what happened.

    What triggered me to start this thread was not the article itself, but the fact that there was car stolen in my neighborhood using this method of 'hacking'.

    I've worked with computers and software long enough to know that nothing digital is fool proof (with the exception of maybe Bitcoin). This applies to encryption algorithms as well. All it takes a dedicated individual(s) with the skills to break these codes. The black marked (dark web) has many hackers who could easily crack these key fob codes and sell it to criminal organizations.

    I'm not saying your car is gonna get stolen, all I was pointing out is that the technology is out there to do it and criminals appear to be using it now.

    Most of you probably don't need to worry about this. But knowing there are thieves using sophisticated tools nearby, I have to adapt and take extra precaution.
     

Products Discussed in

To Top