White hat hackers won a $50,000 bounty! Only because of exploiting loopholes to control all Tesla cars

White hat hacker Jason Hughes once used server-side vulnerabilities to control all Tesla cars. In 2017, Jason Hughes was already well-known in the Tesla community. He used his knowledge and experience to find vulnerabilities in Tesla software and reported the discovered vulnerabilities to the company.
Insert picture description here
After Tesla allowed customers to access more data about super charging stations, Hughes launched an investigation and found a vulnerability on the server side that allowed him to get data from super charging stations around the world every few minutes.
Insert picture description here
He posted the results on the Tesla Motor Club forum. After 20 minutes, he received a call from Tesla’s software security executives, expressing the hope that he would not disclose the vulnerability but notify them in the future. He then started his career as a white hat hacker, and continued to search for vulnerabilities in Tesla's software and servers to obtain small bounties. His biggest discovery was the use of a set of vulnerabilities to successfully access the server mirror library in the Tesla network, one of which was Mothership.
Insert picture description here
Insert picture description here
Mothership is the name of the main server that Tesla uses to communicate with customers' cars. Any remote commands or diagnostic information from Tesla vehicles will go through Mothership. He found a loophole in Mothership that allowed him to send instructions to the car as any Tesla owner. At that time, the remote control function of Tesla cars was still relatively limited. Hughes could not drive the car anywhere, but could use the summon function to summon them. These loopholes earned him a $50,000 bounty.
Insert picture description here
Hackers are a group of technicians wandering on the Internet. They are familiar with the design and maintenance of the operation; they are good at finding out the user’s password, are familiar with computers, and are experts in accessing other people’s computer operating systems, including what some people call internal ghosts. Technicians and computer masters.

The first computer was born at the University of Pennsylvania in 1946, and the first hacker appeared at the Massachusetts Institute of Technology. Bell Labs also has it. The initial hackers are generally some senior technical personnel, who are keen on challenges, advocate freedom and advocate information sharing.

Source: cnBeta

Disclaimer: This article is reproduced for the purpose of conveying more information. If there is an error in the source labeling or infringement of your legal rights, please contact the website with the certificate of ownership, and we will correct and delete it in time, thank you.

Guess you like

Origin blog.csdn.net/weixin_45715145/article/details/108377779