April 4, 2014
April 4, 2014
Dragtimes has a nice little rundown of the latest in hacking the Tesla Model S. It turns out that there is an exposed 4 pin connector on the left side of the dashboard that is actually a 100mb Ethernet connection. That connection was actually connected to with a laptop and after some port scanning and sniffing…
The car’s internal 100 Mbps, full duplex ethernet network consists of 3 devices with assiged IP addresses in the 192.168.90.0 subnet, the center console, dashboard/nav screen and one more unknown device. Some ports and services that were open on the devices were 22 (SSH), 23 (telnet),53 (open domain), 80 (HTTP), 111 (rpcbind), 2049 (NFS), 6000 (X11). Port 80 was serving up a web page with the image or media of the current song being played. The operating system is modified version of Ubuntu using an ext3 filesystem. Using X11 it also appears that someone was able to somewhat run Firefox on both screens as per the pictures. All of this technology certain brings up the question as to when and if Telsa’s internal systems will be hacked and jailbroken to allow 3rd party applications to run on the large 17″ touchscreen. Hacking your iPhone s one thing, hacking your car is quite another. We should also note that apparently Tesla engineers detected this hacking or exploring and sent a nastygram to the cars owner, “Tesla USA engineers have seen a tentative of hacking on my car.”, “can be related to industrial espionage and advised me to stop investigation, to not void the warranty”. Does Tesla have an network intrusion detection system installed on the cars? Do they have the right to not allow you to tinker with your own car?
All really good questions. Will Tesla eventually allow hacking. IT seems like the type of company that would want to encourage it from its extremely savvy customer base. Its APIs for the app are already being used by various companies for things like Google Glass interfaces and Chrome extensions.