[Oeva-list] Slash: Tesla Model S Has Hidden Ethernet Port, User Runs Firefox On the 17" Screen

Alan Batie alan at batie.org
Fri Apr 4 17:05:30 PDT 2014


 Tesla Model S Has Hidden Ethernet Port, User Runs Firefox On the 17" Screen
Posted by timothy on Fri Apr 04, '14 04:16 PM
from the wardriving-in-style dept.
New submitter FikseGTS (3604833) writes "A Tesla Model S owner located a
4 pin connector on the left side of the Tesla Model S dashboard that
turns out to be a disguised ethernet networking port. After crafting his
owns patch cable to connect with the Tesla's port, a networking
connection was established between the Tesla Model S and a laptop
computer. The Model S is running a 100 Mbps, full duplex ethernet
network and 3 devices were found with assigned IP addresses in the
192.168.90.0 subnet. Some ports and services that were open on the
devices were 22 (SSH), 23 (telnet),53 (open domain), 80 (HTTP), 111
(rpcbind), 2049 (NFS), 6000 (X11). Port 80 was serving up a web page
with the image or media of the current song being played. The operating
system is modified version of Ubuntu using an ext3 filesystem. Using X11
it also appears that someone was able to somewhat run Firefox on both of
the Model S screens. Is a jailbroken Tesla Model S on the way?" Some
more details on this front would be appreciated, for anyone who has a
Tesla they'd like to explore.

http://linux.slashdot.org/story/14/04/04/2220259/tesla-model-s-has-hidden-ethernet-port-user-runs-firefox-on-the-17-screen

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5933 bytes
Desc: S/MIME Cryptographic Signature
Url : /pipermail/attachments/20140404/90671458/attachment.bin 


More information about the Oeva-list mailing list