Skip to content

Sniffing V2GTP packets via MAC spoofing ("Biggest Challenges" in readme) #39

Open
@M4GNV5

Description

@M4GNV5

Hey,

we have been partially successfull in convincing the modem to forward packets which were ment for the car to us.
The trick was to send a fake packet which looks like its originating from the car to some random/broadcast address.
This makes the modem think the device with the cars mac address is in fact connected to its ethernet port and thus forwards packets ment for the car to its ethernet side.

Sadly this approach seems to also affect the cars modem and thus it does not forward packets ment for the car to the cars secc anymore i.e. breaking charging communication / causing a lot of retransmissions.

One solution could be to somehow (physically) prevent the modem from actually sending something, but allowing to receive. Somewhat like a diode, but a classical diode probably does not work with the HF powerline signal.
We did some tests with different PIB options to prevent it from sending (i.e. changing the TxGain), but either we did something wrong, or none of them seem to have any effect. I also tried flooding the MAC cache but also without any luck.

Let me know if you have any idea on how to make this work.

You can find our script for spoofing the routing here. And for flooding the cache here

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions