 We are in the car hacking village yet again, looking at a go cart hack right now and homeless hacker has been breaking away at this thing. Are you able to tell me sort of like how have you approached this problem and is there known vulnerabilities you're trying to hit or is this all like kind of from the ground up? This is all from the ground up. We're just trying to figure out what's actually communicating, throwing everything in the kitchen sink at it. Let's start with a simple one. How do you start? Like I'm a noob. I've never done this before. What do I start with? So we're actually working with the software to find radio stuff, getting yourself like a hack RF, starting to understand GNU radio, starting to understand what else have you been working with? GNU radio, GQRX and different tools like that so you can actually see what's happening and what's being sent. That lets you hit the communication between. So just like what started it was the key fob for the Honda. So first we were trying to just capture the information from a key fob to see what was happening with that to start learning how this interacted with the rest of what we were doing. And then starting to turn this on, turn it off and see if it's sending any type of signals that we can capture. So like in that example you can, I'm guessing you can clone that signal. So this one, yes, the young man behind us actually did, he's the gentleman who figured out with the Flipper Zero how to lock and unlock Hondas doing a replay attack. Oh wow, okay. So yeah, so it's been fun kind of taking his research and seeing what else we can do while we're here. Is one of the things you're doing is grabbing, for instance, the replay and then I would say disassembling or trying to understand what it's doing and then you start flipping bits to see would that have a negative impact on this? Not necessarily flipping the bits on this but like there is a little key fob for this thing. Right now we're just trying to get everything set up so tomorrow or later tonight when we've had a couple beers we can sit down and keep doing it. And what's your overall goal you're trying to do? Launch it off the table. No, just trying to figure out like if we can turn it on. So you don't have, do you have access to the controller for this or no, you're not. Oh, okay. So that's the piece I was missing. Yeah. This is the controller for another device. Yeah. You're trying to, without the controller, to recreate the controller for this. Yes, sir. So that you can turn it on, launch it off the table. Well that's why we actually took the wheels off the back. So have you actually, do you hired wire into it at all or no? No, we're just trying to see what we can do without ever putting our hands on it. Hold on, let me get, I'm going to steal the mic. Because this module, this co-cart has a Bluetooth communication and you know traditional Bluetooth communication is malicious. You can compromise it easily and we try to figure it out how we can remotely control it and how we can address it for different purpose and make some fun. This is a really cool project. Oh, good question from Gowery. How long have you been coming to DEF CON? Five years. Five years? What about yourself? DEF CON 13 was my first DEF CON. That's awesome. Is this the first time you've been in the car hacking village? No, I've been helping them for the last three years. Three years? What about yourself? Sorry. How long have you been helping in the car hacking village? Oh, this is my first. It's the first. So you decide to sit down and start hacking away at a go-kart. This is awesome. Thank you so much for sharing what you've been doing. Thank you for watching and as always, hack on.