Flipper Zero: Can It Really Be Used To Steal A Car?

แชร์
ฝัง
  • เผยแพร่เมื่อ 3 มิ.ย. 2024
  • For educational purposes only.
    In this video I show how the fear associated with the F0 and vehicle theft is mostly baseless. Mostly. In reality this device is only able to read and emulate a very small percentage of automotive transponders, which stopped being relevant around 20 years ago.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 60

  • @surlydirtbag
    @surlydirtbag  3 หลายเดือนก่อน +17

    One thing I wanted to add - obviously not all vehicles on the market today are push-to-start, so relay attacks aren't the only way modern vehicles are being stolen. I was just referring to push-to-start vehicles when I made the relay comment.

  • @RubikOwl
    @RubikOwl 3 หลายเดือนก่อน +9

    Finally ordered a Flipperzero after hearing that Canada was going to ban them (I live in the US but hey worlds crazy). Thanks for sharing your insight, now I'll have more info to share with people if they bring up Canada's ban!

  • @ASAPLocksmith
    @ASAPLocksmith 3 หลายเดือนก่อน +13

    This is one the best videos I've seen in a while. The Flipper is %95 hype.

    • @degenapedev
      @degenapedev 3 หลายเดือนก่อน +2

      its still a good tool to have fun with and learn

    • @natey9190
      @natey9190 หลายเดือนก่อน

      Its just an IR blaster

    • @ASAPLocksmith
      @ASAPLocksmith หลายเดือนก่อน

      @degenapedev the cost needs to represent the actual capabilities that has as a penetration testing device . I will never be opposed to anybody learning about science and Technology but the device is being marketed as some Uber hacker incredible game changer . I will admit I was impressed it was able to brute force one specific brand and one specific model of electronic lock on one low quality Home Depot safe. If the flipper were able to Brute Force multiple brands of high-security electronic locks the hype would be real.

  • @maxvideodrome4215
    @maxvideodrome4215 3 หลายเดือนก่อน +5

    I’ve had a F0 for some time. I’m an electronics nerd, cute device - doesn’t do anything you can cobble together yourself. Was kinda unimpressed with it, but I admire how clean the gadget is nonetheless.

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน

      Honestly, the portability is the only reason I like it so much. I have function-specific tools that outperform it by miles.

    • @maxvideodrome4215
      @maxvideodrome4215 3 หลายเดือนก่อน +1

      @@surlydirtbag agreed, I do respect that.

  • @CentiZen
    @CentiZen 3 หลายเดือนก่อน +2

    In my testing, to successfully pull off an attack against a rolling code system you need to a) capture an unlock signal sent from the key, but somehow block it's reception to the intended vehicle or garage door opener, and b) the key can't be used again between the time you captured the signal and the time you replay it. I'm there are more advanced systems than my own personal garage door opener that are resistant to this, but I really don't want to start messing around with a vehicle and accidentally desync one of my keys. I don't have one of those fancy re-programmers!

  • @brlowe2003
    @brlowe2003 3 หลายเดือนก่อน +5

    This video pulled up after watching deviant's video on The flipper being banned in Canada, got to say the TH-cam algorithm did quite well good video and I hope you do well

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน

      Sweet! I appreciate that bit of info for sure. Many thanks!

  • @BerniesBastelBude
    @BerniesBastelBude 3 หลายเดือนก่อน +2

    good to hear an expert's opinion on that matter!

  • @scotttaggart
    @scotttaggart 3 หลายเดือนก่อน +1

    Excellent overview! Thanks.

  • @davidjonathan5114
    @davidjonathan5114 หลายเดือนก่อน

    Great video! Very informative!

  • @stuffilike1845
    @stuffilike1845 3 หลายเดือนก่อน +2

    Nice! Simple! And informative!

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน

      Thank you! I appreciate that!

  • @PocketWomen
    @PocketWomen 3 หลายเดือนก่อน +1

    Thanks for this video, cheers

  • @gam3kid
    @gam3kid 3 หลายเดือนก่อน +1

    Dramatic spike in Camaro thefts due to key cloning devices, LAPD says. These devices are about the size of a cell phone and are a programming tool that picks up the signal of a key fob nearby which the device then clones,” police said.
    Modern car security is worse than previously

  • @aarongordon2998
    @aarongordon2998 3 หลายเดือนก่อน +1

    Thanks for the video!

  • @micahnightwolf
    @micahnightwolf 3 หลายเดือนก่อน +2

    The Flipper Zero is literally just a microcontroller with some radio hardware and a cute dolphin mascot. Anything you can do with the Flipper Zero can also be done with any other microcontroller and the right radio hardware. Got a SDR and a Raspberry Pi? Boom. Key reader, satellite receiver, tag cloner, pet chip reader, you name it. There's no need for governments to fearmonger about the Flipper Zero.

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน

      100%!

    • @Grifov
      @Grifov หลายเดือนก่อน

      Вы можете такое собрать я могу такое собрать, но многие люди не могут такое собрать. Я даже уточню Очень многие не могут собрать такое. А флипер это уже собранный продукт с открытым кодом (да что бы редактировать его тоже нужно что то да уметь в сфере IT но это отдельная тема😅) который можно купить за сравнительно небольшие деньги. Вот они о бздят от этого.

  • @synthwave7
    @synthwave7 3 หลายเดือนก่อน +1

    wow - thanks for showing this. So much hype out there these days.

  • @Sean-John
    @Sean-John 3 หลายเดือนก่อน +1

    Can you open up the new key fobs pull the transponder out and read it? I just had 2 keys made from Amazon blanks and the guy just opened up the old keys put the transponder in the new keys but I doubt the plastic would stop transferring

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน

      You can read them in the key if you have an automotive transponder cloner

  • @DigitalJeremy
    @DigitalJeremy 3 หลายเดือนก่อน +1

    Great explanation! Subbed

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน

      Thank you, and thanks for the sub!

  • @arultherule
    @arultherule 2 หลายเดือนก่อน +1

    Spot on, thanks for making this video!
    Flipperzero is nothing but a toy for script kiddies.

  • @niccosuave5942
    @niccosuave5942 3 หลายเดือนก่อน +1

    Super informative

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน

      Happy to help! Thank you.

  • @davinlaroche3029
    @davinlaroche3029 3 หลายเดือนก่อน +1

    Own a Mercedes with Keyless Go? Double-press the lock button. You should see the LED flash twice then light up for about a second. This turns the key off so it isn't constantly transmitting. Press the unlock button to turn it back on.

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน +1

      Interesting!

  • @my-rules
    @my-rules 3 หลายเดือนก่อน +3

    ty

  • @DanielTimberwolf
    @DanielTimberwolf 3 หลายเดือนก่อน +2

    It is sad to see the knee jerk reactions from people who are in any position of office and haven't the faintest qualifications on how this tech works.. As it stands anything with a radio and software running on it... which is basically everything nowadays would qualify as a "hacking tool"

  • @Golf4org
    @Golf4org 3 หลายเดือนก่อน +2

    You can steal a car with a Lishi Tool and a Laptop with OBD Cable and software for disabling the immobilizer (or for reading the login code and learn a new transponder). This takes around 2 to 5 minutes but is not as convenient as a Flipper, so Lishi Tools are not banned because there are not so much (fake) videos out there. Then you got some care brands like Kia, which removed the immobilizer in cheap models, so a Lishi Tool is enough to get the car open and running. Luckily those cars are sold with immobilizer in Germany (because the law requires this) which adds + 5 minutes for starting them. But in fact, those Keylessentry/-start cars are easier to steal, than the older ones with for example ID48 transponder.

    • @enigma9789
      @enigma9789 3 หลายเดือนก่อน

      On a Ford, It takes a minimum of 30 mins to program a key to steal it.

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน

      The security timer is 10 minutes for fords with PATS

    • @enigma9789
      @enigma9789 3 หลายเดือนก่อน

      @@surlydirtbag yup. 10 mins, then 10 mins per key and you need to program 2

  • @mumbles1justin
    @mumbles1justin 3 หลายเดือนก่อน +1

    Interesting

  • @joseluisJimenez-um6nc
    @joseluisJimenez-um6nc 4 วันที่ผ่านมา

    Hola hay alguna antena para copiar a distancia

  • @kingof9x
    @kingof9x 3 หลายเดือนก่อน +1

    Now i want a translucent key for my 99 jeep

  • @TalkingSasquach
    @TalkingSasquach 3 หลายเดือนก่อน +3

    Nice video! Love that red case!

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน

      Ayyyy, thanks brother. It means alot, especially coming from you!

    • @gphilpot1
      @gphilpot1 3 หลายเดือนก่อน +1

      Seeing you watching other's video to learn is awesome to see. I have learned a lot from your video on the FZ

  • @j0ppi
    @j0ppi 3 หลายเดือนก่อน +2

    nice video ! +1sub

  • @GamingKing545
    @GamingKing545 3 หลายเดือนก่อน +2

    a replay attack could be done with a sdr and a cheap radio

    • @PickedItMate
      @PickedItMate 3 หลายเดือนก่อน

      POC or that comment is just baseless guesswork

    • @EV0L13
      @EV0L13 3 หลายเดือนก่อน

      @@PickedItMateReally? This is common knowledge. Why don’t you Google it instead of being lazy

    • @PickedItMate
      @PickedItMate 3 หลายเดือนก่อน

      @@EV0L13 So an SDR for example the hackRF with portapack and what cheap radio? You're talking out of your backside. Why on earth would I need to google anything nased off that statement, he sounda like a flipper kid and you sound like his yes man

    • @PickedItMate
      @PickedItMate 3 หลายเดือนก่อน +1

      @@EV0L13 and good luck replaying a hitag transponder with those 2 elements, you would at least need a proxmark and LF antenna

  • @degenapedev
    @degenapedev 3 หลายเดือนก่อน

    yep you can use a $35 SDR to replay attack but you can't do that with a $200 flipper zero sorry fam

  • @simengineering9183
    @simengineering9183 3 หลายเดือนก่อน +1

    Great video!! Quick question, can the xhorse program a extra key for Volvo 2008 s80 and 2009 s40?

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน +1

      It's a key cloner, it can't program them, only duplicate the transponders used to start the vehicles. That said, I can't recall what chip that vehicle has, so I am unsure!

    • @simengineering9183
      @simengineering9183 3 หลายเดือนก่อน +1

      @@surlydirtbag Man you are quick✌️, so literally I can just clone my key and start my car but it will show as there's only one key on the system as both are identical, right? Also the remote buttons won't work either without programming the remote to my car?

    • @surlydirtbag
      @surlydirtbag  3 หลายเดือนก่อน +1

      @@simengineering9183 yes, it would just be a mechanical key. As for the remote portion - to be honest with you it's been yeeeeeeears since I touched a Volvo, I don't have a lot of experience with them. I probably have touched less than 5 as an auto locksmith, so I can't help ya there.

  • @devilghost
    @devilghost 3 หลายเดือนก่อน +1

    save me some money! haha