Find or Sell Used Cars, Trucks, and SUVs in USA

Wrangler Lifted 6 Cylinder on 2040-cars

US $5,995.00
Year:1992 Mileage:169755 Color: Black /
 Black
Location:

New Braunfels, Texas, United States

New Braunfels, Texas, United States
Advertising:
Transmission:Manual
Vehicle Title:Clear
Engine:4.0L 242Cu. In. l6 GAS OHV Naturally Aspirated
For Sale By:Dealer
Body Type:Sport Utility
Fuel Type:GAS
VIN: 2J4FY69S9NJ504109 Year: 1992
Interior Color: Black
Make: Jeep
Model: Wrangler
Warranty: Vehicle does NOT have an existing warranty
Trim: Renegade Sport Utility 2-Door
Drive Type: 4WD
Mileage: 169,755
Number of Cylinders: 6
Sub Model: 2dr Renegade
Exterior Color: Black
Condition: Used: A vehicle is considered used if it has been registered and issued a title. Used vehicles have had at least one previous owner. The condition of the exterior, interior and engine can vary depending on the vehicle's history. See the seller's listing for full details and description of any imperfections. ... 

Auto Services in Texas

Youniversal Auto Care & Tire Center ★★★★★

Auto Repair & Service, Automotive Tune Up Service, Brake Repair
Address: 209 N Pleasant Valley Rd, Manor
Phone: (512) 386-5114

Xtreme Window Tinting & Alarms ★★★★★

Auto Repair & Service, Window Tinting, Glass Coating & Tinting
Address: 6411 Mueller Ln Ste A, Hufsmith
Phone: (281) 374-9100

Vision Auto`s ★★★★★

Automobile Body Repairing & Painting, Used Car Dealers, Used & Rebuilt Auto Parts
Address: 2903 Canyon Dr, Amarillo
Phone: (806) 373-9887

Velocity Auto Care LLC ★★★★★

Auto Repair & Service, Automobile Parts & Supplies, Auto Transmission
Address: 200 Byrd St, Kemah
Phone: (409) 935-5000

US Auto House ★★★★★

Used Car Dealers
Address: 7300 Ambassador Row, Farmers-Branch
Phone: (469) 522-0234

Unique Creations Paint & Body Shop Clinic ★★★★★

Automobile Body Repairing & Painting, Automobile Parts, Supplies & Accessories-Wholesale & Manufacturers, Truck Painting & Lettering
Address: Dodson
Phone: (940) 761-2234

Auto blog

Hackers stole Jeeps in Texas using FCA's internal dealer software

Fri, Aug 5 2016

This article has been updated with details on how the thefts were carried out, and with comments from FCA. It seems the news regarding vehicle hacking continues to get worse, especially when it comes to products from Fiat Chrysler Automobiles. Last year, a Jeep Cherokee in St. Louis, Missouri, was wirelessly hacked from Pittsburgh. Nissan had to shut down its Leaf app because of vulnerabilities. Now, a pair of hackers in Houston, Texas, stole more than 30 Jeeps over a six-month period. The two were arrested by police last Friday while attempting to steal another vehicle. ABC 13 in Houston reports that police had been following Michael Arcee and Jesse Zelay for several months but were unable to catch them in the act until now. The two were using a laptop to connect to and start a vehicle. The thieves were able to access Fiat Chrysler's own DealerCONNECT software. After entering the vehicle identification number, the hackers were able to reprogram the cars' security systems to accept a generic key, according to The Houston Chronicle. Additionally, Automotive News reports that FCA subsequently updated the terms of use for its DealerCONNECT program. These thefts were not related to the UConnect remote hacks from last year. This content is hosted by a third party. To view it, please update your privacy preferences. Manage Settings. In April, this surveillance video showed the theft of a Jeep Wrangler Unlimited. It was this footage that first led the police to Arcee and Zelay. The police began to follow and record the pair. That investigation eventually led to Friday's arrest. Both are charged with unauthorized use of a motor vehicle. In addition, Arcee is charged with felon in possession of a weapon and possession with intent to deliver a controlled substance. According to ABC 13, Homeland Security is investigating more than 100 stolen FCA vehicles that they believe were hacked using this method. After their theft, the vehicles were brought across the border to Mexico. FCA is currently conducting an internal investigation into the matter. After this article was posted, the company reached out to Autoblog, stating "FCA US takes the safety and security of its customers seriously and incorporates security features in its vehicles that help to reduce the risk of unauthorized and unlawful access to vehicle systems and wireless communications. FCA US has been cooperating with Houston Police Department since they first started the investigation.

Jeep spied testing Hellcat-powered Grand Cherokee Trackhawk

Fri, Mar 11 2016

The Jeep Grand Cherokee Trackhawk is coming. We know this, because Mike Manley, the head of Jeep, said so. We showed you this brief spy video a while back, but now we have our clearer images of the Trackhawk undergoing testing. And it looks just like a normal Grand Cherokee SRT. Yeah, anti-climactic, we know. The four shots we have show a bit of camo over the front bumper and grille, likely concealing a tweaked design or visible bits of the 6.2-liter, supercharged V8. It looks like there's a rather substantial opening below the upper grille, almost like a ram-air system. There's also a smidge of what looks like tape on the front wheel arches, although this might not mean much of anything. What's interesting is what isn't here. There's no perceivable change to the back of the car. The exhaust pipes look like they're about the same size, there's no noticeable changes to the aerodynamics, and in fact, there's not even any camouflage. Jeep also hasn't updated the Grand Cherokee Trackhawk's hood, which is somewhat surprising considering the changes for every other Hellcat-equipped vehicle (concepts included). You can check out our earliest look at the Trackhawk up top. As for when this monstrous Grand Cherokee will debut, we're expecting it to arrive sometime in 2017, perhaps on FCA's home turf at the Detroit Auto Show. Related Video:

Jeep in St. Louis hacked from Pittsburgh

Tue, Jul 21 2015

One of America's most popular vehicles contains a security flaw that allows hackers to remotely commandeer it from anywhere on the planet. Cyber-security researchers Chris Valasek and Charlie Miller say they've accessed critical vehicle controls on a 2014 Jeep Cherokee that allowed them to remotely control critical vehicle functions like braking, transmission function, and steering. Automakers have downplayed the possibility a car could be remotely compromised, but the significance of the findings detailed Tuesday could cause them to reevaluate the threats posed to hundreds of thousands of vehicles already on the road. A key finding – the pair needed no physical access to the Jeep to pull off the attack. Valasek and Miller accessed the controls via a security hole in the Sprint cellular connection to Chrysler's UConnect infotainment system. In the course of their research, Valasek sat in his Pittsburgh home and remotely manipulated Miller's Jeep as he drove along a highway outside St. Louis. If you know a car's IP address, they say, a hacker could control it from anywhere. "We didn't add anything, didn't touch it," Valasek told Autoblog. "A customer could drive one of these things off a lot, and they'd have no clue it had these open attack surfaces." Remotely, he disabled brakes, turned the radio volume up, engaged windshield wipers and tampered with the transmission. Further, they could conduct surveillance on the Jeep, measuring its speed and tracking its whereabouts. They conducted the experiments over multiple breaches. They made their findings public on the same day the National Highway Traffic Safety Administration, the federal agency in charge of vehicle safety, released its latest report on the readiness of government and automakers to fend off these sorts of cyber attacks. Later today, two US Senators are expected to introduce legislation that would help consumers better understand the potential risks of car hacking. In the early stages of their research, Valasek and Miller found a security flaw in the car's wi-fi that allowed them to remotely manipulate controls from a range of about three feet. But in recent months, they found another vulnerability in the Sprint cellular connection in the UConnect system. That was a key breakthrough. "Lo and behold, we found we could communicate with this thing using cellular, and then more research, and 'Holy cow,' we're using the Sprint network to communicate with these vehicles," Valasek said.