Class Activity - Top Hacker Shows Us How It is Done
Objectives
Understand vulnerabilities of wireless and other common technologies
Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests”
Part 2: Answer the following questions
Background / Scenario
Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.
Required Resources
PC or mobile device with internet access
Instructions
Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos
Holman at TEDxMidwests”
a. Locate the video on the internet and watch it.
b. Choose one of the hacks discussed by Mr. Holman in the video and use your favorite search engine to
conduct some additional research on the hack.
c. For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full
class discussion.
Part 2: Answer the following questions.
Questions:
a. What is the vulnerability being exploited?
Holman demonstrates how hackers can record and duplicate the wireless signal that contemporary
automobile key fobs broadcast in order to take advantage of their weaknesses. This makes it possible for
a hacker to access and even start an automobile without actually having the key.
b. What information, data, or control can be gained by a hacker exploiting this vulnerability?
A hacker can take full control of a car by taking advantage of this weakness, which allows them to open
the doors and start the engine. This presents a serious security risk since it makes it possible for cars to
be stolen without any actual locks being broken.
c. How is the hack performed?
The radio signal that the car key fob emits is captured in order to carry out the hack. The hacker deceives
the automobile into believing the key is close by by increasing the key fob's communication range with a
signal amplifier or relay device. After that, the automobile is remotely unlocked and started.
Type your answers here.
2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 2 www.netacad.com
Class Activity - Top Hacker Shows Us How It is Done
d. What about this particular hack interested you specifically?
The part of this hack that most intrigued me was how it took advantage of a mechanism that most people
take for granted: automobile key fobs. The attack's simplicity along with the absence of tangible proof of a
break-in make it an especially concerning theft technique.
your answers here.
e. How do you think this particular hack could be mitigated?
Car makers might add further security layers, such time-sensitive encryption between the key fob and the
vehicle, or mandate a second form of authentication, like biometrics, to lessen the impact of this incident.
In order to avoid signal interception when not in use, users can also keep their key fobs in signal-blocking
pouches, often known as Faraday bags.This indicates that wireless communication technology security
needs to be continuously improved.
Type your answers here.
End of document
2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 2 www.netacad.com