Tesla Network Activity

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ต.ค. 2024

ความคิดเห็น • 468

  • @TallPaulTech
    @TallPaulTech  11 หลายเดือนก่อน +41

    What's this?.... is it that funky hex ssid coming from a Raspberry Pi AP? :)
    pasteboard.co/OvAjbi9vmRvK.png

    • @Portablesounds
      @Portablesounds 11 หลายเดือนก่อน +9

      Wait wait, so this super fancy autonomous charging robot startup is using default settings on a Raspberry Pi AP for connectivity?

    • @Keneo1
      @Keneo1 11 หลายเดือนก่อน +4

      @@Portablesoundswel the rpi is a super fancy small little cheap computer, why not use it?

    • @eshwayri
      @eshwayri 11 หลายเดือนก่อน +16

      @@Keneo1using it isn't a problem. Leaving things at defaults is an invitation to get hacked though. Even if this particular exploit doesn't lead anywhere, it shows a sloppiness that is worrisome.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +6

      I think you may have missed something @@Portablesounds

    • @Keneo1
      @Keneo1 11 หลายเดือนก่อน +12

      @@eshwayri Paul set up this rpi with that ssid to see what the tesla does when it can connect to it.

  • @nickadams2361
    @nickadams2361 11 หลายเดือนก่อน +16

    In a blazer talking about network traffic, classy af

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +3

      Somebody has to lift the standard up in this IT game.

  • @aliancemd
    @aliancemd 8 หลายเดือนก่อน +5

    9:19 The crazy SSID could be car service center SSID. We did a similar thing for Volvo - the idea was that while the driver is driving into the service center, it would search for predefined SSID from time to time, if it found it, it would authenticate and send diagnostics data, so the service center can approach the customer with info about any problems in the car.
    Edit: Ow, ok, watched a few more seconds - it's probably trying to authenticate with that charger.

  • @hdwill
    @hdwill 11 หลายเดือนก่อน +10

    Yo when you turn to the camera and say "you don't find that suspicious?" hahaha made me laugh my ass off! Thank you for this!

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +4

      Well it's true!

    • @donnied8127
      @donnied8127 11 หลายเดือนก่อน +3

      @@TallPaulTech Just one more reason to isolate all IoT on a separate VLAN and block all access to other networks.
      This just reminds me of "unknown" data streams from Huawei cell base stations that one of my mates back in UK told me about 20+ years ago when they were setting those up for the first 3G network there.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +5

      Yeah, it lives on its own VLAN, don't worry about that!

  • @CubbyTech
    @CubbyTech 11 หลายเดือนก่อน +11

    802.11g = cheap and reliable - decent speed over the longest range of any existing protocol. Thanks for showing us the noise!

    • @tschuuuls486
      @tschuuuls486 11 หลายเดือนก่อน +6

      And as this is probably an MCU1 tesla, the mcu board design probably dates back to 2010-12 where most people didnt have modern aps in the garage and some engineer probably figured cheap and reliable wifi is better than expensive and flaky

  • @genemys
    @genemys 11 หลายเดือนก่อน +175

    When your own Tesla brake checked you I knew that was Elon warning you not to go any further with your investigations. I love these types of videos and want to see more - stay safe!

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +42

      Don't laugh, the way things are going...

    • @csvscs
      @csvscs 11 หลายเดือนก่อน +8

      Yeah it's actually pretty scary. Maybe start a separate channel for this type of investigation or do it via proxy

    • @a9503128
      @a9503128 11 หลายเดือนก่อน +3

      Elon supplements his revenue by selling your data to data brokers. I’m laughing yet not laughing.

  • @mahmutdikcizgi9773
    @mahmutdikcizgi9773 11 หลายเดือนก่อน +11

    keep doing what you are doing. loving it

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +10

      I'll do what I want mother fucker!

  • @trav13k
    @trav13k 11 หลายเดือนก่อน +8

    Tall Paul coming in with the big Tesla automated charging scoop. Watch out Murdoch! 😂

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +13

      Tesla couldn't automate a fucking toaster

    • @trav13k
      @trav13k 11 หลายเดือนก่อน +3

      @@TallPaulTech certainly not based off that capture nonsense

  • @hgbugalou
    @hgbugalou 10 หลายเดือนก่อน +25

    Does the DHCP flooding come from the factory or do you need to pay extra for it? 😂

  • @dave7244
    @dave7244 11 หลายเดือนก่อน +9

    This is quality. Thanks for doing this.

    • @khx73
      @khx73 11 หลายเดือนก่อน +4

      I love it.. it's exactly the kind of thing I would do... and actually I do to other things I own. Love Paul's videos... even though he'd probably call me a cunt 😀

  • @mrdrummer2564
    @mrdrummer2564 10 หลายเดือนก่อน +26

    Surely the seemingly random sites like nytimes, bing, etc would be from the infotainment system?

    • @TommyTommy
      @TommyTommy 10 หลายเดือนก่อน +6

      Or maybe they get used to check internet connectivity, my router does the same thing

    • @BellCube
      @BellCube 10 หลายเดือนก่อน +4

      They could very well be used to check if the network can access the wider internet.

  • @GeorgeNoory42069
    @GeorgeNoory42069 11 หลายเดือนก่อน +16

    Love the new style. Looking like the senior network engineer for the Italian mafia Lolol

  • @tantryl
    @tantryl 11 หลายเดือนก่อน +15

    Odds of randomly generating that same 32 character hex string: 1 in 340,282,366,920,938,500,000,000,000,000,000,000,000.
    Seems legit.

  • @jper1245
    @jper1245 11 หลายเดือนก่อน +21

    My concern is that it sounds like its listening for things that has nothing to do with it... It doesnt sound like anything malicious now but i could easily see it going that way in the future.

    • @theexoreviewer5699
      @theexoreviewer5699 10 หลายเดือนก่อน

      Elon “Tesla” data leak shown the video recording of people having sex in their cars. Including “18 and below” fucking in car. All the cameras footage gets sent to Tesla regardless.

    • @alext3811
      @alext3811 10 หลายเดือนก่อน

      Or you know if a threat actor found a way to exploit it.

  • @treelineresearch3387
    @treelineresearch3387 11 หลายเดือนก่อน +15

    Guessing it's doing a full DHCP association every time because it's shutting down the radio to save power, I did something similar on a weather sensor that reports over wifi on the minutes scale and is in deep sleep at all other times.

  • @ipinfo-io
    @ipinfo-io 11 หลายเดือนก่อน +17

    2:48 Thank you very much for featuring us!

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +6

      Haha, no worries. It did the job.

  • @trevorsmale
    @trevorsmale 11 หลายเดือนก่อน +9

    Love the TPM sleuthing. It seems like an intentional design decision to kill and restart the leases so frequently.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +7

      Yeah, that TPM stuff was a bit of a surprise

    • @DanielFSmith
      @DanielFSmith 11 หลายเดือนก่อน +4

      @@TallPaulTech I guess you need to snoop the SSID at the SuperCharger station.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +2

      There are data pins in the charger you know.

  • @TheBeefiestable
    @TheBeefiestable 11 หลายเดือนก่อน +8

    Great work, I love the tidbit about connecting a specific developer to some crazy example of security through obscurity. "Hey I know lets just bastardize the way SSIDs work for our product, that will be good enough!"

  • @r6u356une56ney
    @r6u356une56ney 11 หลายเดือนก่อน +12

    If you've got its VLAN firewalled and are not allowing it to access some of the things it wants to, that could explain why it keeps dropping off and reconnecting.

  • @fromgermany271
    @fromgermany271 11 หลายเดือนก่อน +14

    So the „Software Company, that also builds cars“ is using probably Linux and can’t configure DHCP correctly.
    Looks like they are as perfect in any area.

  • @trebekanalbumcover
    @trebekanalbumcover 11 หลายเดือนก่อน +12

    Love to see if broadcasting that SSID enables anything in the Tesla menus for autonomous charging. Be hilarious if that was the only authentication performed to enable the feature.

  • @enryfrafranci
    @enryfrafranci 11 หลายเดือนก่อน +14

    9:20 my wildest guess there would be that it's the way that the car speaks to superchargers, would be cool to do a capture at a supercharger location just to see if it's related...

    • @jebw
      @jebw 11 หลายเดือนก่อน +2

      Although it wouldn't be easy you could setup an access point with that semi random SSID to do some sniffing.

    • @enryfrafranci
      @enryfrafranci 11 หลายเดือนก่อน +3

      @@jebw i mean, the password is very likely hardcoded in the firmware as is thr ssid so I'm pretty sure it could be recovered, but that would be useless if it's not actually used at a supercharger

  • @ericfrazer4736
    @ericfrazer4736 11 หลายเดือนก่อน +16

    monitor for wifi attempts to connect to that rando ssid, and you now have a tesla detector, lol. reminds me of bbc vans wardriving with df to find rogue unlicensed tv sets

  • @BGraves
    @BGraves 11 หลายเดือนก่อน +9

    Frequent disconnects and reconnect probably explains why it takes so long to install a rather small update over a wifi gateway that sits 12 feet away...

  • @Devinfrbs
    @Devinfrbs 11 หลายเดือนก่อน +15

    Sounds like somebody developing the charging handshake might have copied from a forum post lol.

  • @portblock
    @portblock 11 หลายเดือนก่อน +12

    These may or may not be relevant:
    At 2:46 - we (programmers) lookup those A records from those domains because they use CDN's and depending on what IP is returned, I have a better idea of the area/region you are in. . I also do it to have a solid idea if we have network connectivity.
    At 9:30 - I have done this for some embedded system that I want to auto connect to a wifi access point I have setup. Example: Rent a car, we have various access points setup around the city at our locations, when a vehicle goes by one, it automatically checks in its its vehicle metrics (VIN, fuel, odometer, CEL, etc.)

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +5

      Now tell me why it's the same random hex from a TPM. Also, every AP that I've played with so far won't let you set arbitrary hex values for the SSID.

    • @iburn36360_
      @iburn36360_ 11 หลายเดือนก่อน +8

      (Obligatory not a Tesla engineer)
      In addition to coarse geo-location, looking up various known "good/available" hostnames is also a very easy way to know if the DNS server you are routed to is trustworthy, since those records should not all respond with the exact same resolution address (Either in a stack of A records, AAAA records, a DNAME or CNAME) and should, at least mostly, always respond with at least SOME resolution. If all of those response with the exact same host, one of the rfc1918, or seem to be resolving with only ever the same TTL no matter the variation of the poll due to network, wakeup and other latencies, then you can assume that the network is either malfunctioning or hostile.
      In this case, it is likely that the cellular network is being used as a cache of good lookups to compare to in the event that the main network lookup starts to seem suspicious, or if the responses coming from "Tesla" start to look wrong from the software point of view. If things start to look wrong, the car can query for those hostnames, trusting that cellular should be reasonably unmodified/trustworthy as an initial check that the domains still exist, and query the main network as a form of sanity check (We used to do this at a place where I worked in-application to do exactly this. In our case, it was a way of notifying the user that their VPN was malfunctioning and that they needed to reconnect to get the correct authoritative servers).
      To test the theory, you could start sinking the requests goin to www(dot)teslamotors(dot)com as an NX_DOMAIN and see if the car starts to fail over to the cellular, or starts to probe using the alternate sane domains to determine if the network is poisoned. That said, I wouldn't really recommend testing such a thing on a motor vehicle given the expense associated with an electric vehicle, so it might end up being just a theory until a Tesla engineer could confirm or deny.

    • @portblock
      @portblock 11 หลายเดือนก่อน +1

      @@TallPaulTech yea thats a strange on, could be sloppy programmer (we all do it) oh let me copy this string since I need some random chrs. or maybe the 1 in infinibillion chance a repeat lol - it got me stumped too

    • @mtx33
      @mtx33 11 หลายเดือนก่อน +3

      @@portblock i've got some serious "uninitialized pseudorandom generator" vibes from this. (without seed or similar rookie mistake) but that theory doesn't make too much sense as an SSID, most probably just some fixed "random number" he picked for the project as you suggested. My hunch is that this "magic number" could be some hidden SSID used by charging stations, tesla services, etc, which network only answering to "signed payloads" hence the need for TPM signature (like "i'm not a random device trying to connect to this network, I'm a tesla. I have a valid key in my TPM") It could be part of a handshake or something similar.
      Now the most strangest part that I discovered this exact number (if i'm getting this right) is part of some cipher's test suite inside the Botan crypto library (eg. last entry of the shacal2.vec file). You can use the Github Code Search to get quite a few matches (This function is still in a public beta, if i remember right ).

  • @eshwayri
    @eshwayri 11 หลายเดือนก่อน +8

    I would be very curious to find out what it would do if you provided it with a network with that SSID. You're right most software wouldn't let you set that, but I am sure there is something out there that can be convinced to.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +7

      I could try with hostapd if I ever get keen. I know some people have trouble with SSIDs that are foreign characters but they still exist, so it must be possible. Right at this morning I can't be fucked trying.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +1

      I just did... see pinned comment :)

  • @NathanM229
    @NathanM229 11 หลายเดือนก่อน +13

    That SSID broadcast must be some dumb hack to "authenticate" the charger, I bet if you spammed that from any other device near by and presuming there isn't some other authentication built into the physical charger iteself, you could get a third party car charging. Probably there is some upper limit for other cars..?

    • @tschuuuls486
      @tschuuuls486 11 หลายเดือนก่อน +3

      I mean you would still need the password not just the ssid :D
      But yes that sounds like a last minute hack, I guess the older cars don't support wifi direct or something along those lines :D

  • @jabadoo5307
    @jabadoo5307 11 หลายเดือนก่อน +5

    I wish you had a GM Onstar vehicle to do this to. My truck has Onstar and I’d love to see where things are going and what I can change to control my data.
    Aside from that, keep up the great videos. I’m learning so much from you, especially on the Home Assistant and SDR side.

    • @Tschacki_Quacki
      @Tschacki_Quacki 11 หลายเดือนก่อน

      You can't generate clicks with GM.

  • @CZpersi
    @CZpersi 11 หลายเดือนก่อน +20

    Any car that uses internet connection should have manual switch to turn the network features off, so that users/drivers can activate them only when _they_ want. Companies are so greedy for user data, they hoard them in petabytes "just in case" and for what? Advertising? There is not even enough evidence that this data collection really increases efficiency of advertising to the level that would really make it justifiable. It puts customer safety at risk, while scamming the advertisers at the same time.

    • @codefeenix
      @codefeenix 11 หลายเดือนก่อน +4

      any thing that uses anything should have turn offable

    • @AndrewTSq
      @AndrewTSq 11 หลายเดือนก่อน +4

      even worse I saw some Chinese ev car, where the manufactor was bankrupt, the cars do not start anymore cause they need to talk to some server...

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +1

      Well if you look at the previous video about their shitty service, you'll see the screen issue it's now having. They said they can look through the logs at the time it happens if I note the time. The thing is, I can't look at the logs, only them. In a normal world, you'd be able to look at your own logs first to maybe figure something out, before having to reach out to service. But, that of course means they wouldn't be able to steal as much money from you and ... well, they can't have that.

  • @alexbrown4023
    @alexbrown4023 10 หลายเดือนก่อน +9

    The ppp stuff will be related to the 4/5g module. It used to be a common way of connecting to those modules.

  • @ab2tract
    @ab2tract 11 หลายเดือนก่อน +13

    weird a tesla from 2017 would be trying to reach a website that appears to have gone down in 2016

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +3

      You mean the HTTP? There's a web server there, as it got an HTTP response. It just got told that / has nothing for it.

  • @justinklein7071
    @justinklein7071 11 หลายเดือนก่อน +7

    Thanks Paul! This is super informative video and I loved all the details and your thoughts! I wonder if my 2023 M3P is just as talkative

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +9

      There's only one way to find out.

  • @genzinvestments74
    @genzinvestments74 9 หลายเดือนก่อน +4

    Would like to see it redone with something not as old. 2017 might not seem old but back then Tesla was using mostly off the shelf parts from 3rd parties, these third parties are notorious for not updating their shiet.

  • @trustnoone81
    @trustnoone81 11 หลายเดือนก่อน +6

    Everyone should make their passwords so secure that they're confident to show their four-way handshakes openly.

  • @mjmeans7983
    @mjmeans7983 11 หลายเดือนก่อน +6

    Would be relatively simple to use SSID probe requests as a low bandwidth encrypted sideband communication. That code could just be an Identification Friend of Foe (IFF) signal (to use military terminology). Would be interested to see what else happens if you set up something to respond to that probe.

  • @Bartek2OO219
    @Bartek2OO219 11 หลายเดือนก่อน +13

    the most intresting traffic is gonna be on celluar

  • @speedmytube
    @speedmytube 11 หลายเดือนก่อน +9

    Is that the SSID they use at Tesla service centres for vehicles to automatically connect to? Would not be surprised if some junior dev just googled "32 bit random hex" and copy/pasted whatever they found because the JIRA said make the SSID something random and long.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +8

      Hahaha... but hang on, aren't they supposed to be super experts?! LOL... as if

    • @monad_tcp
      @monad_tcp 11 หลายเดือนก่อน +6

      ah, the fair dice resulting in 4 from XCKD obligatory

    • @opless
      @opless 11 หลายเดือนก่อน +2

      @@TallPaulTechtheres always junior/lazy Devs especially at big companies

    • @codefeenix
      @codefeenix 11 หลายเดือนก่อน

      @@TallPaulTech no

  • @SubhomoyHaldar
    @SubhomoyHaldar 11 หลายเดือนก่อน +1

    Reminds me of the networking labwork we did at UofGlasgow. Thank you for the video and discussion!

  • @Psi105
    @Psi105 11 หลายเดือนก่อน +7

    I've not looked into this in some time, but some telemetry cellular data plans have a min block size, So if you send 1 byte within X timeframe they charge you for the data usage of 1 block, and the block size might be 32KB or something.
    So they might be doing some tricks to minimize getting excessive data charges for periodically sending a very small amount of data.

    • @PetWanties
      @PetWanties 11 หลายเดือนก่อน +2

      Good point!!

    • @Keneo1
      @Keneo1 11 หลายเดือนก่อน +1

      I would assume that tesla has some fleet plan that covers all their data and usage in one bill, a bit like an unlimited data plan?
      That contract could of course also include conditions on sending to many small packets.
      But that would not apply on the WiFi network?

  • @edgecrush3r
    @edgecrush3r 11 หลายเดือนก่อน +10

    Wonder what you can capture if you spoof the ppp0 as host in your DNS. On second note, i wonder if we can trigger any known glibc buffer overflows by exploiting the dns lookup

    • @swagmuffin9000
      @swagmuffin9000 11 หลายเดือนก่อน +2

      I don't know if you can do it by exploiting dns, but i think it was vulnerable to a buffer overflow. Saw a video a few months ago about it, so don't remember exactly

  • @eldaiblol1492
    @eldaiblol1492 11 หลายเดือนก่อน +5

    TL;DR: Network stack was written by some second year college interns...
    Thanks though, very informative and well explained!

  • @jaybonart6293
    @jaybonart6293 11 หลายเดือนก่อน +5

    Another great video. Hope the court thing ends soon for you.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +2

      haha, steady on!

  • @slygamer01
    @slygamer01 11 หลายเดือนก่อน +11

    Could the random SSID be a fixed SSID that Tesla superchargers use?

    • @Maarten_vd
      @Maarten_vd 11 หลายเดือนก่อน +4

      Could be, or a service center SSID?

    • @zahlex
      @zahlex 11 หลายเดือนก่อน +2

      @@Maarten_vd Service center was for a log time "Tesla Service" and is now "tesla-vehicle". The SSID is publicly announced, you can see it with your phone and the car displays that it is connecting to that and preventing you from disconnecting or deleting the network 🤣

    • @Maarten_vd
      @Maarten_vd 11 หลายเดือนก่อน +1

      @@zahlex Cool, thanks for your info :)

  • @0x42NaN
    @0x42NaN 11 หลายเดือนก่อน +4

    thanks for your analysis, was a charm watching

  • @lordstevewilson1331
    @lordstevewilson1331 11 หลายเดือนก่อน +9

    Wireless g has better wall penetration, ie, garage walls, and I bet car doesn't use much data for updates.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +1

      I could make a whole video (or many) on why that comment lacks understanding.

  • @RangieNZ
    @RangieNZ 11 หลายเดือนก่อน +3

    PPP0 is often your routers login session, to your local internet fabric (xDSL, fibre, etc). Interesting about the hard coded long wifi name - at as guess, I'd suggest the autonomous charge stations will all broadcast that SSID, so the car knows when it is quite close. Really interesting topic.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +5

      No, I did some testing today... might make a follow up video

  • @pawepiat6170
    @pawepiat6170 11 หลายเดือนก่อน +5

    Perhaps some of it is supposed for charging stations? That ppp0 might try to get talking to some on site thing?? Same for those random bytes, that you yourself found to be related to a charging company.

  • @sulrich70
    @sulrich70 11 หลายเดือนก่อน +13

    Conclusion? So they smash dns requests, they are trying to connect to a wifi network associated with an ev charging company, they only use wifi bgn at 54mbps, and they connect through port 443 to grab/push data. Anything else I missed? (Sorry I know nothing about networks)

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +10

      802.11g, not 802.11n

  • @1nsTommy
    @1nsTommy 11 หลายเดือนก่อน +5

    this first curl after DHCP could easily be for a SPLITDNS setup.
    A man in the middle to break the SSL would be so nice to see :P
    About splitdns: imagine the car beeing inside a tesla factory/servicecenter, obtaining not your ISPs DNS server, instead a tesla DNS server which answers the same domain with different records from within tesla's network. common use case in the field :)

    • @JeyZlp
      @JeyZlp 11 หลายเดือนก่อน +1

      if you do ssl pinning it won't work, if the software requests it

  • @ehsnils
    @ehsnils 11 หลายเดือนก่อน +5

    The risk of information leak and unplanned network security issues is why I turn off UPnP whenever I see it.
    It may be convenient, but it's also a pretty large risk.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +4

      Yeah, I don't let that shit out, and keep this car on its own VLAN. I just forgot to stop it coming out of the IPv6 link local on a server, because it was just a bridge adaptor and I forgot about it.

  • @snowsnoot
    @snowsnoot 11 หลายเดือนก่อน +7

    The silently dropped connection is probably a java app that is using finalizers, which causes the app to leave the connection open in the kernel until garbage collection runs and cleans up the network object. Yea java is rubbish

  • @Dwonis
    @Dwonis 11 หลายเดือนก่อน +8

    I wonder if that TPM is using a bad RNG, like the Debian openssl RNG bug from a decade ago.

  • @monad_tcp
    @monad_tcp 11 หลายเดือนก่อน +8

    No trying to man-in-the-middle the TLS tunnel ?
    I guess I'll have to buy a Tesla and do it myself to see what happens

  • @dumpy4289
    @dumpy4289 11 หลายเดือนก่อน +6

    matlab function rnd vs random (i cant remember which one) would always present the same random number. it was documented.
    Also, the 2 minute thing - could this be a system safety element? like a watch dog timer- if something critical isnt there then it will be time to take remedial actions?

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +5

      None of that makes sense.

  • @jwaddin
    @jwaddin 11 หลายเดือนก่อน +2

    Very interesting, thanks for sharing!

  • @monkeytimesmagazine3725
    @monkeytimesmagazine3725 11 หลายเดือนก่อน +14

    maybe one day we will have an open source OS for teslas so you could set up your own network connections, personally ensure there's no bloat-ware, and replace the self driving with openpilot

    • @lostsauce0
      @lostsauce0 11 หลายเดือนก่อน +4

      Seems like a lotta hoops to jump through just to go to Wendy's

    • @jerasaurus1926
      @jerasaurus1926 11 หลายเดือนก่อน +5

      Open pilot is a lot worse than Tesla AP tho

    • @monkeytimesmagazine3725
      @monkeytimesmagazine3725 11 หลายเดือนก่อน +1

      @@jerasaurus1926 howso?

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +3

      I'd like it if it had nothing 'auto'.

    • @monkeytimesmagazine3725
      @monkeytimesmagazine3725 11 หลายเดือนก่อน

      @@TallPaulTech with an open source vehicle you could remove the LIDAR or cameras and the programs to run them if you wanted so it wouldnt waste power and subsequently range

  • @bsl2501
    @bsl2501 11 หลายเดือนก่อน +2

    @TallPaulTech much enjoyed this video. don't have an explanation at hand for the strange probe request, but I can give a guess about Wi-Fi 3. Since the very first MCU (nvidia tegra based, eMMC) has been designed around 2010 to 2012, they probably went for the then cheap Wi-Fi 3 module even though Wi-Fi 4 was available. The intel atom based MCU2 comes with Wi-Fi 4 and does feature a 5GHz radio (*indoor channels are not supported, only outdoor channels can be used).

  • @PicaMula
    @PicaMula 11 หลายเดือนก่อน +70

    Tesla has bad code? What a shock, wow. That's unexpected 😮😂😂

  • @timballam3675
    @timballam3675 11 หลายเดือนก่อน +6

    How about setting up a Esp8266 to accept that probe request? Is it security by obscurity?

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +4

      You missed something I said about being able to do that.

    • @zmey-
      @zmey- 11 หลายเดือนก่อน +1

      Why does it have to be Esp8266?

  • @Zecr
    @Zecr 10 หลายเดือนก่อน +11

    That random SSID = Supercharger WiFi/auth network?

    • @TallPaulTech
      @TallPaulTech  10 หลายเดือนก่อน +10

      No, it's more likely shitty leaky code.

    • @NikoBelliGaming
      @NikoBelliGaming 10 หลายเดือนก่อน +4

      @@TallPaulTech "We use TPM for security!"
      *the TPM*
      **tpm_random_bytes = "blah" // Change for production**

    • @TallPaulTech
      @TallPaulTech  10 หลายเดือนก่อน +1

      Haha@@NikoBelliGaming

  • @m4rvinmartian
    @m4rvinmartian 11 หลายเดือนก่อน +12

    *2:20** Probably been said. All 8's is Google. Possibly Chrome doing stuff.*

    • @florianflorian1385
      @florianflorian1385 10 หลายเดือนก่อน +2

      Embedded devices do sometimes double check if the dns response is the same when querying a public DNS, like Google. Or maybe as a fallback. But since the wifi DNS did reply I think it's more like a sanity check. But the target, nyt, netflix queries are just stupid.

  • @unicodefox
    @unicodefox 11 หลายเดือนก่อน +6

    Interesting that a lot of data from the mobile network is spilling over to the WiFi side (DNS, I think a lot of mobile data goes over PPP as well). Are you sure that 'server' is a result of your 'server', or it was just a generic name coded into the car?

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน

      I wondered that too, but the time of its lookup was too close to the announcement from mine. True though, I can't be 100% sure.

  • @jandraelune1
    @jandraelune1 10 หลายเดือนก่อน +8

    On mobile devices, that much searching for connections leads to a dead battery over night if you don't shut off the wifi when in sleep mode.

  • @apalrd8588
    @apalrd8588 11 หลายเดือนก่อน +3

    After a previous video of yours about phy rates, I disabled G on all of my APs only to find all of the dumb IoT devices that still don't support N. Amazing that anything for sale now doesn't support at least 2.4Ghz N.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +3

      Yeah, all the ESP stuff that I have is 802.11n, and they're simple things.

  • @vzylexy1506
    @vzylexy1506 10 หลายเดือนก่อน +7

    802.11g on a "modern" device is absolutely wild

    • @kurdm1482
      @kurdm1482 10 หลายเดือนก่อน

      fun fact G standard has the highest broadcast range of the wifi.

  • @dermick
    @dermick 11 หลายเดือนก่อน +6

    Glad I found your channel - good work here! Every time I run a sniffer to try to debug things I get so depressed at the state of software, and looks like Tesla is no exception. If they miss this easy stuff, what about the hard stuff? I'd be *shocked* to find out that a Tesla can be hacked! /s

    • @Tschacki_Quacki
      @Tschacki_Quacki 11 หลายเดือนก่อน

      Go ahead show us how you can hack a Tesla. You can make big dollars legally.

  • @samuraidenis
    @samuraidenis 11 หลายเดือนก่อน +6

    I reckon there's some more digging to be done ;) any more thoughts on the contents of the dhcp request ids ?

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +4

      Oh, there will be more digging :)

  • @hgbugalou
    @hgbugalou 10 หลายเดือนก่อน +6

    Reallllly weird with that tpm rando. You need to keep digging there for sure.

    • @TallPaulTech
      @TallPaulTech  10 หลายเดือนก่อน +8

      I've already dug enough to know it's a heap of shit.

  • @plexoduss
    @plexoduss 11 หลายเดือนก่อน +4

    The whole Rocsys saga is quite fascinating. I wonder if you agree to be a datasource for third parties when bought this car? I think that when you open a Gmail account you agree to share data for it being a free service but when you buy an object I would like to know more. And the fact that it bypasses your Pi-hole is disturbing a bit, maybe it had a hickup/delay of some sort but you should be the ruling admin in that case.

  • @mikehibbett3301
    @mikehibbett3301 11 หลายเดือนก่อน +4

    Great analysis, thanks

  • @ZeCatable
    @ZeCatable 10 หลายเดือนก่อน +4

    Great content! Funny to see all Tesla ecosystem oddities. I was wondering ; maybe it is using NTP servers passed in the DHCP options?

    • @pootispiker2866
      @pootispiker2866 10 หลายเดือนก่อน

      I'd reckon it's just DNS servers being contacted for every connection

  • @khx73
    @khx73 11 หลายเดือนก่อน +5

    10:58 LMAO I love it

  • @steinmar2
    @steinmar2 11 หลายเดือนก่อน +2

    Nice video could show how you captured it ? The first is doing port mirroring and sniffing or? The second is new for me
    I started studying automotive computing and we are just learning about network technology and tools

    • @cleverca22
      @cleverca22 11 หลายเดือนก่อน +1

      since my router is just a linux box with 2 ethernet ports, i could just run tcpdump right on that, no mirroring needed

  • @Senetus
    @Senetus 11 หลายเดือนก่อน +4

    DId you try with ssl offloading to see the contents of all the api calls etc?

  • @r6u356une56ney
    @r6u356une56ney 11 หลายเดือนก่อน +5

    What happens if you don't let a Tesla have Internet access at all? No wifi, no cell/sim? Will it refuse to let you drive it?

    • @utha2665
      @utha2665 11 หลายเดือนก่อน +3

      Well, they do drive well out of cell range and they drive fine. You don't have to have the sim activated but I guess Tesla will still utilise it, there's just some some stuff you can't access without the sim activated.

    • @BeamDeam
      @BeamDeam 11 หลายเดือนก่อน +5

      It will let you drive normally

  • @RK-ly5qj
    @RK-ly5qj 11 หลายเดือนก่อน +2

    All cars connected to the network constantly "doing something" :)
    Regarding tesla, its a price of autonomous cars (pilot) etc. It will more.

  • @HenryBiglin
    @HenryBiglin 11 หลายเดือนก่อน +5

    The car is just DDOS’ing the inferior equipment on your network. Lol

  • @shmuel6
    @shmuel6 11 หลายเดือนก่อน +3

    Great stuff brother. Thank you so much

  • @EastyUK
    @EastyUK 11 หลายเดือนก่อน +5

    How many brands can connect to a WiFi AP I wonder? Both my new Toyota and Audi cannot, therefore rendering all the smart features useless at my cell service delinquent home location.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +2

      Well that one's going to require more detailed information (ie, packet captures) before we can say anything.

  • @EditioCastigata
    @EditioCastigata 10 หลายเดือนก่อน +2

    2:50 Looks like you have the head unit? Try to analyze with the head unit disconnected, xor with the back unit (ADAS) disconnected. Tip: If you ever have a Mercedes (doesn't use DHCP), look at the VLANs and connect to the multicast groups of each of the networks on there.

  • @LukePWilkinsVids
    @LukePWilkinsVids 11 หลายเดือนก่อน +2

    Thanks Paul! Brilliant video

  • @declanmcardle
    @declanmcardle 11 หลายเดือนก่อน +6

    Well, we'll all leave our computer screens and Teslas alone now and go and watch something on our nice safe Samsung TVs, because they couldn't be doing anything peculiar either, could they?

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +2

      Yeah, same shit everywhere... th-cam.com/video/8mHXwmULOvk/w-d-xo.html

    • @dave7244
      @dave7244 11 หลายเดือนก่อน +1

      I refused the bullshit T&C that sends it sends data to some third party I've never heard of. This turns off most of the bullshit.
      The other thing people are doing it dumbing down their TV on some models by purchasing the version of the board that is used for shop displays.

  • @gonesilent2814
    @gonesilent2814 11 หลายเดือนก่อน +4

    Going to guess this is an MCU 1 car?

  • @0101-s7v
    @0101-s7v 11 หลายเดือนก่อน +3

    Would some of this (the external HTTP) before the entertainment system?

  • @NikoBelliGaming
    @NikoBelliGaming 10 หลายเดือนก่อน +4

    Great video! I especially appreciate how you don't jump to conclusions, and mostly just share the facts.
    I'd sub, but your name reminds me too much of someone I strongly dislike.

  • @adamgarlow5347
    @adamgarlow5347 11 หลายเดือนก่อน +12

    Thanks for the informative video, I'm glad it got suggested to me. I'm not old or anti tech, but I fail to see how any of that is necessary for making a car go down a road. Just reaffirms why if I ever have to own electric, it'll be an engine swap with open source hardware.

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +12

      You know what, I like your approach. I'm sick of crap being allowed because of the notion that only old people or non "tech savvy" don't want it. Most of the people who I know who are most against this shit are right in the tech industry. It's not like we don't know how things work, we just know it's bullshit!

    • @andybrice2711
      @andybrice2711 11 หลายเดือนก่อน +1

      I assume they're collecting data to detect faults sooner, improve future designs, and train self-driving cars. But it's reasonable to question whether they have any right to use your personal data like that, and whether they're protecting it adequately. Anonymous data is often quite easy to de-anonymize.

    • @kjetilho
      @kjetilho 11 หลายเดือนก่อน +1

      it is not necessary, you can rip out the SIM card of the car if you like. obviously then you will lose mobile app control (remote unlock etc.)

    • @adamgarlow5347
      @adamgarlow5347 11 หลายเดือนก่อน

      @@kjetilho yeah I could get the SIM card out and remove the WiFi but I shouldn't have to do surgery on a new car just so it respects my privacy. I'm also going to assume that voids the warranty. Not that the warranty is worth much to begin with. For the kind of money they ask, there are batteries, contractors, motors, etc. available. If I already have to do surgery to ameliorate my car, I'd rather spend a few weekends electric swapping something older, prettier, and fully my own.

    • @kjetilho
      @kjetilho 11 หลายเดือนก่อน +1

      @@adamgarlow5347 - no you don't have to do that, it will not collect data unless you agree to it.

  • @nickjeffrey8050
    @nickjeffrey8050 10 หลายเดือนก่อน +6

    Updating the apps on the screen. Like Netflix and TH-cam lol

    • @TallPaulTech
      @TallPaulTech  10 หลายเดือนก่อน +8

      AKA, bloated shit, preventing the car from operating basic controls the way is used to.

  • @Rostol
    @Rostol 11 หลายเดือนก่อน +5

    very interestng, thanks for this !! how did you capture the GSM packets ? edit: just realized it's getting the dns from the gsm link and trying it over the net

    • @TallPaulTech
      @TallPaulTech  11 หลายเดือนก่อน +1

      There you go :)

  • @Ausijoeblow
    @Ausijoeblow 9 หลายเดือนก่อน

    Hi Paul, very good work you are doing here. I saw the same you did with Tesla. I’m sure your audiences would be interested to compare what all these high tech cars from different countries are doing in terms of infringing into personal data

  • @chrisdixon5241
    @chrisdixon5241 11 หลายเดือนก่อน +2

    Very interesting, thanks for sharing!
    How did you sniff the Telstra traffic if it goes over mobile phone network?
    Cheers,
    Chris

    • @captainchaos3667
      @captainchaos3667 11 หลายเดือนก่อน +2

      This is just the Wi-Fi traffic. There's no telling what the car is communicating via its LTE connection.

  • @MammaApa
    @MammaApa 11 หลายเดือนก่อน +21

    As a swede I am currently entertained by seeing Elon trying to go up against IF Metall, one of the largest unions of workers in the country. They have a strike fund reserve counted in billions, large enough to strike for as long as they could possibly need to. Workshops have started to deny service to Tesla cars. Elon will have to fold to their demands or leave Sweden. It's not even a question. It has happened in the past with Toys R Us and McDonalds. Sweden is union strong.

    • @bartwaggoner2000
      @bartwaggoner2000 11 หลายเดือนก่อน +4

      Scary how socialistic Europe is, and how rapidly USA is heading that way…

    • @marceelino
      @marceelino 11 หลายเดือนก่อน +2

      @@bartwaggoner2000 in my country unions are corrupted through and through so they are useless to working class.

    • @darkzone1606
      @darkzone1606 11 หลายเดือนก่อน +3

      @@bartwaggoner2000 how is a union scary?

    • @bartwaggoner2000
      @bartwaggoner2000 11 หลายเดือนก่อน +1

      @@darkzone1606 reading comprehension

  • @seanys
    @seanys 11 หลายเดือนก่อน +16

    It’s almost as though the code running on the car is shit.

  • @bobmcbob4399
    @bobmcbob4399 11 หลายเดือนก่อน +12

    You say that a car making requests to netflix etc is not a car thing, but I would put it to you that a car interfacing with any network is not a car thing. lol. Who wants one of the mobile spy stations in your garage? You already carry one of those around in your pocket most likely.

    • @treelineresearch3387
      @treelineresearch3387 11 หลายเดือนก่อน +1

      Can confirm, my cars are all from the normal car era (contrast with the home theater on wheels era) and don't even have network interfaces!

  • @monad_tcp
    @monad_tcp 11 หลายเดือนก่อน +3

    4:32 why be polite and close the toilet seat, they also must have infinite server power in their TLS terminator router

  • @bobamu
    @bobamu 11 หลายเดือนก่อน +3

    I'm sure those completely random numbers being identical is a complete and utter coincidence.
    Anyway, back to selling bridges to folk.

  • @liveyourbestlife1513
    @liveyourbestlife1513 10 หลายเดือนก่อน +4

    Maybe the use of 802.11g is a way of throttling the network demands from the car. It’s usually much harder to throttle a device that wants to download lots of data without support from the router.

    • @TallPaulTech
      @TallPaulTech  10 หลายเดือนก่อน +10

      No. Just, no.

    • @CockyBallyTorture
      @CockyBallyTorture 10 หลายเดือนก่อน +1

      If you have a decently capable router you can simply set a download and upload speed for specific devices.

    • @florianflorian1385
      @florianflorian1385 10 หลายเดือนก่อน +1

      I suspect a rugged, cheap wifi chip that just works.

  • @padden999
    @padden999 11 หลายเดือนก่อน +4

    Anyone asked why we see Tall Paul in handsome suits now? :)

  • @computersales
    @computersales 11 หลายเดือนก่อน +9

    That is kind of alarming if I understand correctly. The car is scanning my netwotk? Might have to put my car on its own private part of my network. 🤔

    • @Keneo1
      @Keneo1 11 หลายเดือนก่อน +8

      No the network was advertising stuff to the car and the car tried to follow up
      But yes, put all things on their own private part and only give them access to to watch they need access to

    • @computersales
      @computersales 11 หลายเดือนก่อน +2

      @@Keneo1 I need to learn how to lock down my network one of these days. 🙈

    • @lakorai2
      @lakorai2 11 หลายเดือนก่อน +2

      ​@@computersalesMake a IoT wifi vlan

    • @Keneo1
      @Keneo1 11 หลายเดือนก่อน +2

      @@computersales an easy consumer friendly way is to make a guest network and set it so that guest can only connect to the internet and not each other. Then connect all smart stuff that needs internet to this network.
      This is an option in a lot of decent AP’s I have seen.
      Doesn’t work if you want to have your phone connect directly to the thing. But works for things that want to use the internet and you don’t want to look in your internal network.
      If you want to jump into the deep end. Set up packetfence.

    • @Tschacki_Quacki
      @Tschacki_Quacki 11 หลายเดือนก่อน +1

      You didn't understand correctly.

  • @danh9002
    @danh9002 11 หลายเดือนก่อน +2

    Great video.