{"id":18522,"date":"2016-06-30T14:00:01","date_gmt":"2016-06-30T06:00:01","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=18522"},"modified":"2016-06-29T19:00:19","modified_gmt":"2016-06-29T11:00:19","slug":"%e7%a0%94%e7%a9%b6%e4%ba%ba%e5%93%a1%e6%89%be%e5%88%b0%e4%b8%89%e8%8f%b1outlander%e7%9a%84%e7%84%a1%e7%b7%9a%e7%b6%b2%e8%b7%af%e6%bc%8f%e6%b4%9e","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=18522","title":{"rendered":"\u7814\u7a76\u4eba\u54e1\u627e\u5230\u4e09\u83f1Outlander\u7684\u7121\u7dda\u7db2\u8def\u6f0f\u6d1e"},"content":{"rendered":"<p>PenTestPartners\u7684\u8cc7\u5b89\u7814\u7a76\u4eba\u54e1\u62ab\u9732\u4e86\u4e09\u83f1\u71b1\u92b7\u63d2\u96fb\u5f0f\u6cb9\u96fb\u6df7\u5408\u8eca\uff08PHEV\uff09 <a href=\"https:\/\/www.mitsubishi-cars.co.uk\/outlander\/\">Outlander<\/a>\u53ef\u80fd\u5c0d\u8eca\u4e3b\u9020\u6210\u5371\u5bb3\u7684\u56b4\u91cd<a href=\"https:\/\/www.zdnet.com\/article\/mitsubishi-outlander-car-alarm-can-be-hacked-through-wi-fi\/\">\u6f0f\u6d1e<\/a>\u3002\u9019\u500b\u57286\u67085\u65e5\u79ae\u62dc\u4e00\u6240\u767c\u8868\u7684<a href=\"https:\/\/www.pentestpartners.com\/blog\/hacking-the-mitsubishi-outlander-phev-hybrid-suv\/\">\u5b89\u5168\u901a\u544a<\/a>\u5167\u63cf\u8ff0\u4e86\u9019\u500b\u5f71\u97ff\u65e5\u672c\u4f11\u65c5\u8eca\u7684\u5b89\u5168\u6f0f\u6d1e\uff0c\u9019\u500b\u6f0f\u6d1e\u53ef\u4ee5\u8b93\u653b\u64ca\u8005\u53bb\u4fb5\u5165\u6c7d\u8eca\u9023\u7dda\u505a\u51fa\u81ea\u5df1\u60f3\u505a\u7684\u4e8b \u2013 \u95dc\u9589\u6c7d\u8eca\u8b66\u5831\u7cfb\u7d71\u6216\u662f\u5176\u4ed6\u5371\u96aa\u7684\u4e8b\u60c5\u3002<\/p>\n<p>\u9019\u500b\u5b89\u5168\u6f0f\u6d1e\u8ddf\u8eca\u4e0a\u7684\u7121\u7dda\u7db2\u8def\u6a21\u7d44\u6709\u95dc\uff0c\u958b\u555f\u4e86\u88ab\u5165\u4fb5\u7684\u901a\u9053\uff0c\u653b\u64ca\u8005\u4e0d\u50c5\u53ef\u4ee5\u9023\u4e0a\u8eca\u5b50\u7684\u8b66\u5831\u7cfb\u7d71\uff0c\u9084\u6709\u5176\u4ed6\u8a2d\u5b9a\uff0c\u8b93\u653b\u64ca\u8005\u6216\u4efb\u4f55\u5916\u4f86\u8005\u53ef\u4ee5\u53bb\u8017\u76e1\u8eca\u5b50\u7684\u96fb\u6c60\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>[<\/strong><strong>\u5ef6\u4f38\u95b1\u8b80\uff1a<\/strong><a href=\"https:\/\/blog.trendmicro.com.tw\/?p=14487\">\u8eca\u8f1b\u906d\u99ed\uff1a\u99ed\u5ba2\u771f\u7684\u6709\u8fa6\u6cd5\u64cd\u7e31\u60a8\u7684\u8eca\u8f1b<\/a><strong>]<\/strong><\/p>\n<p>\u767c\u73fe\u6f0f\u6d1e\u7684\u7814\u7a76\u4eba\u54e1\u89e3\u91cb\u8aaa\uff1a\u300c<em>\u5229\u7528\u884c\u52d5\u61c9\u7528\u7a0b\u5f0f\u9023\u4e0a\u8eca\u5b50\u7684\u65b9\u5f0f\u4e26\u4e0d\u6b63\u5e38\uff0c\u56e0\u70ba\u5927\u591a\u6578\u9060\u7aef\u9059\u63a7\u61c9\u7528\u7a0b\u5f0f\u8981\u5b9a\u4f4d\u8eca\u5b50\u3001\u9583\u5927\u71c8\u6216\u9060\u7aef\u4e0a\u9396\u6703\u5229\u7528\u7db2\u9801\u670d\u52d9\u9032\u884c\uff0c\u800c\u9019\u7db2\u9801\u670d\u52d9\u662f\u7531\u6c7d\u8eca\u5ee0\u5546\u6216\u5176\u670d\u52d9\u4f9b\u61c9\u5546\u63d0\u4f9b\uff0c\u900f\u904e<\/em><em>GSM<\/em><em>\u7db2\u8def\u9023\u5230\u8eca\u4e0a\u7684\u6a21\u7d44\uff0c\u9019\u6a23\u4eba\u5011\u5c31\u53ef\u4ee5\u5f9e\u5e7e\u4e4e\u4efb\u4f55\u5730\u65b9\u900f\u904e\u884c\u52d5\u65b9\u5f0f\u4f86\u8207\u6c7d\u8eca\u9023\u7dda\u3002<\/em>\u300d<\/p>\n<p>\u800cOutlander PHEV\u4e26\u975e\u4f7f\u7528\u5e38\u898b\u7684GSM\u6a21\u7d44\uff0c\u800c\u662f\u4f7f\u7528\u7121\u7dda\u7db2\u8def\u9023\u7d50\uff0c\u7814\u7a76\u986f\u793a\u9019\u500b\u6a21\u7d44\u4e26\u6c92\u6709\u88ab\u5b89\u5168\u7684\u5be6\u4f5c\uff0c\u5176\u5171\u4eab\u91d1\u9470\u5f88\u5bb9\u6613\u88ab\u7834\u89e3\u3002\u9664\u6b64\u4e4b\u5916\uff0c\u6bcf\u53f0Outland\u90fd\u6709\u7368\u7279\u7684\u7121\u7dda\u7db2\u8def\u540d\u7a31\uff0c\u9019\u4ee3\u8868\u60e1\u610f\u653b\u64ca\u8005\u53ef\u4ee5\u8f15\u6613\u5730\u8ffd\u8e2a\u4ed6\u5011\u6240\u770b\u4e2d\u7684\u8eca\u5b50\uff0c\u4e00\u65e6\u60e1\u610f\u5206\u5b50\u89e3\u9396\u4e26\u6ef2\u900f\u7cfb\u7d71\uff0c\u5c31\u6709\u8fa6\u6cd5\u9032\u884c\u5404\u7a2e\u53ef\u80fd\u7684\u653b\u64ca \u2013 \u63a7\u5236\u8eca\u8f1b\u71c8\u5149\u3001\u6eab\u5ea6\uff0c\u751a\u81f3\u662f\u4e0a\u9396\/\u958b\u9396\u529f\u80fd\u3002<br \/>\n<!--more--><\/p>\n<p>\u5728\u5c0dZDnet\u6240\u767c\u8868\u7684<a href=\"https:\/\/www.zdnet.com\/article\/mitsubishi-outlander-car-alarm-can-be-hacked-through-wi-fi\/\">\u8072\u660e<\/a>\u4e2d\uff0c\u767c\u73fe\u6f0f\u6d1e\u7684\u7814\u7a76\u4eba\u54e1\u8868\u793a\u6b64\u6f0f\u6d1e\u5df2\u7d93\u8ddf\u8a72\u516c\u53f8\u6b63\u5f0f\u6e9d\u901a\u904e\uff0c\u4f46\u9019\u6c7d\u8eca\u5927\u5ee0\u4f5c\u51fa\u6f20\u4e0d\u95dc\u5fc3\u7684\u56de\u61c9\uff0c\u800c\u6709\u8da3\u7684\u662f\uff0c\u7576\u8cc7\u6599\u62ab\u9732\u7d66\u5a92\u9ad4\u5f8c\uff0c\u4e09\u83f1\u5b98\u65b9\u5f88\u8fc5\u901f\u5730\u4f5c\u51fa\u56de\u61c9\uff0c\u6839\u64da\u5831\u5c0e\uff0c\u4fee\u5fa9\u7a0b\u5f0f\u5df2\u7d93\u5728\u958b\u767c\u4e2d\u3002<\/p>\n<p>\u6839\u64da<a href=\"https:\/\/www.bbc.com\/news\/technology-36444586\">\u4e09\u83f1<\/a>\u8868\u793a\uff0c\u5168\u4e16\u754c\u6c92\u6709\u5176\u4ed6\u5730\u65b9\u4f5c\u51fa\u985e\u4f3c\u5831\u5c0e\uff0c\u64da\u4fe1\u5df2\u7d93\u6709\u8d85\u904e10\u842c\u53f0\u7684\u6cb9\u96fb\u6df7\u5408\u8eca\u552e\u51fa\uff0c\u8a72\u516c\u53f8\u6307\u51fa\u4ed6\u5011\u5c0d\u6b64\u4e8b\u76f8\u7576\u91cd\u8996\uff0c\u6b63\u8207\u7814\u7a76\u4eba\u54e1\u548c\u6709\u95dc\u7576\u5c40\u5bc6\u5207\u5408\u4f5c\u4f86\u89e3\u6c7a\u6b64\u5b89\u5168\u6f0f\u6d1e\u6240\u53ef\u80fd\u5e36\u4f86\u7684\u5371\u5bb3\u3002\u622a\u81f3\u76ee\u524d\u70ba\u6b62\uff0c\u8abf\u67e5\u4ecd\u5728\u9032\u884c\u4e2d\uff0c\u8a72\u516c\u53f8\u547c\u7c72\u8eca\u4e3b\u5728\u61c9\u7528\u7a0b\u5f0f\u53d6\u6d88VIN\u8eca\u8eab\u865f\u78bc\u8a3b\u518a\u4f86\u505c\u7528\u5167\u5efa\u7684\u7121\u7dda\u7db2\u8def\u3002<\/p>\n<p>\u5728<a href=\"https:\/\/www.ic3.gov\/media\/2016\/160317.aspx\">\u4eca\u5e74\u4e09\u6708<\/a>\uff0c\u6709\u95dc\u7576\u5c40\u767c\u5e03\u4e86\u516c\u5171\u670d\u52d9\u5ba3\u5c0e\u4f86\u8b66\u544a\u516c\u773e\u95dc\u65bc\u6c7d\u8eca\u9060\u7aef\u6f0f\u6d1e\u7684\u6301\u7e8c\u98c6\u5347\u3002\u7f8e\u570b\u806f\u90a6\u8abf\u67e5\u5c40\uff08FBI\uff09\u7684\u516c\u544a\u6307\u51fa\uff0c\u300c<em>\u7f8e\u570b\u806f\u90a6\u8abf\u67e5\u5c40\uff08<\/em><em>FBI<\/em><em>\uff09\u548c\u7f8e\u570b\u570b\u5bb6\u516c\u8def\u4ea4\u901a\u5b89\u5168\u7ba1\u7406\u5c40\uff08NHTSA<\/em><em>\uff09\u8b66\u544a\u516c\u773e\u548c\u5ee0\u5546\uff08\u6c7d\u8eca\u3001\u6c7d\u8eca\u96f6\u4ef6\u6216\u5f8c\u52e4\u4fdd\u990a\uff09\u8981\u5c0d\u73fe\u4ee3\u5316\u6c7d\u8eca\u806f\u7db2\u6280\u8853\u7684\u6f5b\u5728\u554f\u984c\u548c\u7db2\u8def\u5b89\u5168\u5a01\u8105\u63d0\u9ad8\u8b66\u89ba\u3002<\/em>\u300d<\/p>\n<p>\u667a\u6167\u578b\u6c7d\u8eca\u4e00\u518d\u56e0\u70ba\u5b89\u5168\u932f\u8aa4\u800c\u51fa\u73fe\u6f0f\u6d1e\uff0c\u4e09\u83f1\u4e5f\u52a0\u5165\u4e86\u884c\u5217\u3002\u57282016\u5e742\u6708\uff0cTroy Hunt\u548cScott Helme\u767c\u73fe<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/nissan-leaf-can-be-hacked-via-mobile-app-and-web-browser\">\u65e5\u7522Leaf<\/a>\u8eca\u7528\u61c9\u7528\u7a0b\u5f0f\u53ef\u80fd\u88ab\u7528\u4f86\u9060\u7aef\u5165\u4fb5\u4efb\u610f\u65e5\u7522Leaf\u7684\u8eca\u8f09\u7cfb\u7d71\uff0c\u800c\u5728\u76f8\u540c\u7684\u4e8c\u6708\u7a0d\u65e9\uff0c\u4e00\u540d\u8056\u5730\u4e9e\u54e5\u7814\u7a76\u4eba\u54e1\u5206\u4eab\u5982\u4f55\u5229\u7528\u667a\u6167\u578b\u6c7d\u8eca\u4f5c\u696d\u7cfb\u7d71\u7684\u56b4\u91cd\u6f0f\u6d1e\u4f86\u52ab\u6301\u6c7d\u8eca\uff0c\u53ea\u9700\u8981\u64ad\u653e\u4e00\u7247\u5e36\u6709\u60e1\u610f\u8edf\u9ad4\u7684\u5149\u789f\uff0c\u800c\u57282015\u5e74\uff0c\u5b89\u5168\u5c08\u5bb6Chris Valasek\u548cCharlie Miller\u5229\u7528\u65b0\u6b3eJeep Cherokee\u76843G\u9023\u7dda\u529f\u80fd\u4f86\u8868\u6f14<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=14040\">\u6c7d\u8eca\u52ab\u6301\u7279\u6280<\/a>\uff0c\u7d50\u679c\u5c0e\u81f4140\u842c\u8f1b\u6c7d\u8eca\u88ab\u53ec\u56de\uff0c\u5728\u90a3\u9805\u5be6\u9a57\u4e4b\u5f8c\uff0c\u7814\u7a76\u4eba\u54e1\u9084\u767c\u73fe\u80fd\u5920\u7528\u4f86\u64cd\u63a7\u8eca\u8f1b\u715e\u8eca\u53ca\u5176\u4ed6\u7cfb\u7d71\u7684\u6f0f\u6d1e\u3002<\/p>\n<p>\u8cc7\u6df1\u5a01\u8105\u7814\u7a76\u54e1Rainier Link\u5728\u5176\u5c08\u5bb6\u898b\u89e3<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/expert-insight-securing-smart-cars\">\u5f71\u7247<\/a>\u4e2d\u8ac7\u5230\u667a\u6167\u578b\u6c7d\u8eca\u5b89\u5168\u6027\u4ee5\u53ca\u6c7d\u8eca\u5ee0\u5546\u5728\u638c\u63a7\u6b64\u4e00\u65b0\u8208\u6280\u8853\u7684\u5b89\u5168\u6027\u6642\u6240\u8a72\u626e\u6f14\u7684\u89d2\u8272\u4e2d\u63d0\u5230\uff1a\u300c<em>\u5c31\u6c7d\u8eca\u5ee0\u5546\u800c\u8a00\uff0c\u4ed6\u5011\u6216\u8a31\u64c1\u6709\u8c50\u5bcc\u7684\u9020\u8eca\u77e5\u8b58\uff0c\u4f46\u537b\u7f3a\u4e4f\u4e86\u4e9b\u5c0d<\/em><em>IT<\/em><em>\u5b89\u5168\u7684\u77e5\u8b58\uff0c\u56e0\u70ba\u9019\u5c0d\u4ed6\u5011\u4f86\u8aaa\u662f\u65b0\u7684\u9818\u57df\u3002<\/em>\u300d<\/p>\n<p>&nbsp;<\/p>\n<p>\uff20\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/researchers-uncover-wifi-vulnerability-in-mitsubishi-outlander\">Researchers Uncover WiFi Vulnerability in Mitsubishi Outlander<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PenTestPartners\u7684\u8cc7\u5b89\u7814\u7a76\u4eba\u54e1\u62ab\u9732\u4e86\u4e09\u83f1\u71b1\u92b7\u63d2\u96fb\u5f0f\u6cb9\u96fb\u6df7\u5408\u8eca\uff08PHEV\uff09 Outlander\u53ef\u80fd [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":18523,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[1723,1335,2380],"tags":[1599,2790,1593,1519],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/18522"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18522"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/18522\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/media\/18523"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=18522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=18522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}