How to Hack a Garage Door in Under 10 Seconds and What You Can Do About It - ITS Tactical
Shop the ITS Store!

How to Hack a Garage Door in Under 10 Seconds and What You Can Do About It

By The ITS Crew


We’ve talked in depth about garage doors and their vulnerabilities on ITS, but today we wanted to highlight a discovery made by Samy Kamkar using a children’s toy and some common materials. The device he’s created, dubbed the OpenSesame, can open a garage door using a brute force attack in less than 10 seconds.

How Garage Door Openers Work

Before we get into the details of the vulnerability, let’s explain a bit about how automatic garage door openers developed. The first electric garage door opener was introduced in 1926, but didn’t gain in popularity until after World War II. These openers usually involved a wired switch being run from the door motor to a keypad or button that could be pressed from inside the vehicle. As technology improved, the wireless remote was created and used radio signals to transmit a code from the remote control to the opener itself. Once the code was transmitted, the opener would receive it and run the motor to draw the door up or down.


In the 1960’s, as automatic openers were more widely adopted, it was discovered that the doors all used the same code. Since the doors used the same signal and code, any remote could open any door. Thieves quickly discovered that by purchasing a few remotes from different manufacturers, they could open nearly any door. This led the garage door industry to introduce new openers that featured changeable codes.

Don’t Be a Dip Switch

Manufacturers wanted to design an opener with a code that could be set by the owner in case they needed to replace or add new remotes. These new programmable openers featured a series of 8-12 dip switches that could be set in the up or down position to create a unique code. This meant that for an 8 switch remote there were 28 or 256 possible codes and on a 12 switch remote there were 212 or 4,096 possible codes. This greatly decreased the chances of the door’s code being matched by a thief armed with a standard remote, as they would need to sit outside and physically set each dip switch and test the new code.

This might sound like a large number of possible codes but in binary terms, it’s not much. In fact, using a two character alphanumeric password would be more secure than this and would provide more combinations.

Do the Math

The method that Samy Kamkar used to attack these type of garage doors was a brute force attack, in which he sent every possible code (4,096) to the door until it would open. The device he used to perform this brute force attack was a slightly modified IM-ME children’s toy. He found that if he transmitted each code five times with a wait period behind the code, he could transmit every possible code to the door in about 29 minutes. That’s a pretty scary fact as theoretically, a thief could sit in a car outside your home for that long without being noticed. Unfortunately, that’s not the worst of it as Samy discovered that he could dramatically shorten the length of time it took to open the door using math.

Samy found that by transmitting each code only once rather than five times, the time was reduced to 6 minutes. Many times, remotes transmit the code multiple times in case of interference, but there’s rarely ever any, so transmitting it once seems to work just fine. Not only that, he also discovered that removing the wait times between the codes took the time down to 3 minutes. So if there wasn’t a wait time between codes, how could the opener know when one code stopped and another began?


The answer lies in the fact that the openers use what’s called a Bit Shift Register, where it’s only looking for a part of the code to match up with the actual code. This is a very insecure method to check the code and results in a dramatic decrease in the overall time it takes to send all the codes to the opener since the opener is checking all possible permutations of a code and doesn’t have a defined start and end point.

Knowing that the opener used a Bit Shift Register, Kamkar was able to apply The De Brujin Sequence to transmit all possible codes much quicker and managed to take the total time down to just 8.7 seconds.

Preventing the Attack

Luckily, most automatic openers today aren’t affected by this exploit since they use “Rolling” codes, where the code is changed every time the door is opened. However, there are some manufacturers that are still producing openers with dip switches. These manufacturers include Nortek / Linear / Multi-Code and NSCD/North Shore Commercial Door. Older models from vendors such as Chamberlain and Liftmaster can also be vulnerable so you should double check to ensure that your door does not feature this technology.


The best method to check your opener is to check the remote. If you open the remote and find dip switches, you should upgrade the opening system immediately. Look for a system that offers Rolling Codes, Hopping Codes, Intellicode or Security Plus. The remote above is a good example of a Rolling Code remote because it lacks dip switches. These technologies don’t rely on a fixed code and are harder to hack. Keep in mind though that nothing is foolproof, so you should design your security around that.

Additional ITS Article Resources

Top 10 Garage Door Security Tips to Prevent Break-Ins

Safety Announcement: Protecting Against Garage Door Break-Ins

How to Escape from Zip Ties

Use These Tips to Protect You and Your Family Against Home Invasions

Beat The Clock: Most Burglaries Take Place in Minutes

What To Do in the Crucial Three Hours after a Burglary

Did you get more than 14¢ of value today?

If so, we’d love to have you as a Crew Leader by joining our annual membership! Click the Learn More button below for details.

Thanks to the generosity of our supporting members and occasionally earning money from qualifying purchases as an Amazon Associate, (when you click our Amazon links) we’ve eliminated annoying ads and content.

At ITS, our goal is to foster a community dedicated to learning methods, ideas and knowledge that could save your life.


Do you have what you need to prevail?

Shop the ITS Store for exclusive merchandise, equipment and hard to find tactical gear.

Do you have what you need to prevail? Tap the button below to see what you’re missing.