LinkLiar VS Simos18_SBOOT

Compare LinkLiar vs Simos18_SBOOT and see what are their differences.

Simos18_SBOOT

Documentation and tools about Simos18 SBOOT (Supplier Bootloader), including a Seed/Key bypass and Tricore boot password recovery tool. (by bri3d)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
LinkLiar Simos18_SBOOT
3 5
1,200 84
- -
9.2 0.0
about 2 months ago about 2 years ago
Swift Python
MIT License -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

LinkLiar

Posts with mentions or reviews of LinkLiar. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-08-13.
  • Hyundai car software update private keys came from easily Googleable sample code
    7 projects | news.ycombinator.com | 13 Aug 2022
  • Mac keeps disconnecting from WiFi
    1 project | /r/applehelp | 8 Mar 2022
    Ever since I used https://github.com/halo/LinkLiar , my Mac disconnects and reconnects from WiFi every few minutes. I have tried resetting network preferences and nothing has worked.
  • My mom unplugged the wifi router so I can focus on my online classes.
    1 project | /r/teenagers | 24 Apr 2021
    Are you on Mac, Windows, Linux, or something else? If you're on Mac, there's an open source app I use. If you're on Windows, there are some tutorials you can follow to do it without installing anything (I've tried it on Windows once a long time ago, so I'm not really sure if it still works). If you're on Linux, there are also tutorials, though I've never tried them before so I'm not sure if they work. Also, to avoid suspicion, you may want to change your netBIOS/localhost name (actually, I'm not sure if they're the same thing, but changing either seems to have the same result since its visible when logged into your router settings. You can do it via Settings or Terminal for Mac and there are probably some tutorials for Windows and Linux.)

Simos18_SBOOT

Posts with mentions or reviews of Simos18_SBOOT. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-05.
  • Can Injection: keyless car theft
    2 projects | news.ycombinator.com | 5 Apr 2023
    I did find an older VW "emergency start" product that claims to only work with Bosch MED17 and MED9, and I suspect it's using a memory-access primitive (either UDS or CCP) to release the immobilizer.

    It's trivial to disable an immobilizer in software by re-flashing the ECU, yes, but modern ECUs have two strong protections against this:

    * Cryptographic signature checking against update/re-flash payloads (I've done extensive research on these on VW Continental ECUs - https://github.com/bri3d/VW_Flash )

    and an even better and more obvious protection:

    * The ECU application software won't descend into the re-flash software (Customer Bootloader) unless the immobilizer is free (a valid key is present).

    This is a lot of what helps to reduce surface area from an "emergency start" style attack to an AKL attack - now that the Customer Bootloader won't start without the Immobilizer being unlocked, an attacker needs to remove the control unit to flash it with a Supplier Bootloader exploit ( https://github.com/bri3d/simos18_sboot ) or physical access (BDM/JTAG).

  • ECU resources
    8 projects | /r/CarHacking | 29 Aug 2022
    SIMOS18 SBOOT: https://github.com/bri3d/simos18_sboot Illustrates common security vulnerabilities in modern control units (inadequate RNG entropy, reset exploits). Illustrates common "SBOOT recovery mode break-in" / "TSW Mode" concept that many control units have.
  • Hyundai car software update private keys came from easily Googleable sample code
    7 projects | news.ycombinator.com | 13 Aug 2022
    That's pretty cool! I wonder how properly they were really signed - there are _so many_ mistakes even in systems that at least don't use an example key off the Internet.

    The most common ones I know of are:

    * Out-of-bounds write issues allowing "signature was validated" flags to be overwritten in Flash memory, like https://github.com/jglim/UnsignedFlash

    * State machine mistakes, like https://github.com/bri3d/VW_Flash/blob/master/docs/docs.md - allowing Flash to be written again after it was already written, without an erase first.

    * Filesystem parsing mistakes, like those in a number of VW AG head units: https://github.com/jilleb/mib2-toolbox/issues/122

    * The use of RSA with E=3 and inadequate padding validation, like https://words.filippo.io/bleichenbacher-06-signature-forgery... .

    * Failure to understand the system boundaries, like in the second part of https://github.com/bri3d/simos18_sboot where "secret" data can be recovered by halting the system during a checksum process.

    * Hardware fault injection issues, as used in https://fahrplan.events.ccc.de/congress/2015/Fahrplan/system... .

    Fundamentally this is of course, a very hard problem, since in the "protect against firmware modification" case, the attacker has physical access. But, compared to the state of the art in mobile devices and game consoles, automotive stuff is still way behind.

  • Hacking a VW Golf Power Steering ECU
    4 projects | /r/ReverseEngineering | 4 Jan 2022
    My writeups and JG Lim's cover three of the common mistakes in modern modules (supplier backdoor bugs in Simos supplier bootloader, state machine issues in Simos VW bootloader, and block buffer validity confusion / bounds check issues in Mercedes instrument cluster).
  • Simos18 Supplier Bootloader (SBOOT) Exploit: Reading Boot Passwords
    4 projects | /r/CarHacking | 7 Mar 2021
    I have glossed over all of the actual data details here for brevity. For details including exact messages (and code!), please visit https://github.com/bri3d/Simos18_SBOOT

What are some alternatives?

When comparing LinkLiar and Simos18_SBOOT you can also consider the following projects:

Hot - Hot is macOS menu bar application that displays the CPU speed limit due to thermal issues.

ghidra_tc1791_registers

HWID-shifter - Spoofing the Windows 10 HDD/disk drive serial number.

mib2-toolbox - The ultimate MIB2-HIGH toolbox.

open-source-mac-os-apps - 🚀 Awesome list of open source applications for macOS. https://t.me/s/opensourcemacosapps

VWsFriend - VW WeConnect visualization and control

LocationSimulator - MacOS application to spoof / fake / mock your iOS / iPadOS or iPhoneSimulator device location. WatchOS and TvOS are partially supported.

TC1791_CAN_BSL - CAN Bootstrap Loader (BSL) for Tricore AudoMAX (TC1791 and friends), including arbitrary read/write as well as compressed read functionality.

Amethyst - Automatic tiling window manager for macOS à la xmonad.

VW_Flash - Flashing tools for VW AG control units over UDS. Compression, encryption, RSA bypass, and checksums are supported for Simos18.1/6/10, DQ250-MQB, DQ381-MQB, and Haldex4Motion-Gen5-MQB.

UnsignedFlash - Firmware signature bypass on the IC204