Skip to content

OpenGK-org/smartra_bruteforce

Repository files navigation

SMARTRA bruteforce

Bruteforce immo pins based on values sniffed on W-Line during key exchange

Preparing the data

First, hook a serial interface to W-Line, set baudrate to 4800 and start listening.

Then, put the key in ignition and switch to IGN.

ECU will perform the challenge/response verification with key and your log should look something like this

exchange example

  • Value highlighted red is your key id

  • Value highlighted blue is your random

  • Value highlighted pink is your crypto

Usage

Plug the data like so:

python3 guess_multiprocessing.py <key_id> <random> <crypto> [step]

Additionally, at the end you can add the step parameter.

By default, it's set to 16 because all immo pins are dividable by 16.

However, that's not true in vehicles intended for the russian market and in such cases you'll need to set it to 1

After 2-120 seconds the immo pin should be calculated

The initial, simpler version of the script (guess.py) serves as documentation since it's much less complex

About

Bruteforce SMARTRA immo pins based on one sniffed exchange

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors