Skip to content

PoC for vulnerability found on the Autopi dongle (GPU version)

Notifications You must be signed in to change notification settings

jmatss/thesis-cuda

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

IoT Penetration Testing: Security analysis of a car dongle

Proof of concept for hack on AutoPi found during bachelor thesis (link, CVE-2019-12941).

Vulnerability

The Raspberry Pi which the AutoPi is built upon, has a unique 8 character hex serial number. This number is md5 hashed into a 32 character hex string, also known as the “dongle id“, “unit id” or “minion id” [row 9]. The dongle id is a unique identifier of the AutoPi dongle and the first 6 bytes are used as wifi password while the last 6 bytes are used as wifi SSID. This means that one can deduce the the wifi password from the broadcasted SSID. Root access is given if connected to the AutoPi dongle via wifi.

crackwifi takes a SSID as arguments, runs through all possibles hashes and retreives the correct wifi password in less than a second. Requires a nvidia graphics card. Adapted from http://macs-site.net/md5oncudawhitepaper.html.

Usage:  crackwifi <12 hex SSID>
C:\thesis>nvcc crackwifi.cu -o crackwifi >NUL && crackwifi 38676c1698f0
Serial:    00000000ad993618
Hash:      392c797ca4ea72d6797d38676c1698f0
SSID:      AutoPi-38676c1698f0
Password:  392c797ca4ea

About

PoC for vulnerability found on the Autopi dongle (GPU version)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages