Главная
Study mode:
on
1
Intro
2
Automotive Security
3
What is CAN?
4
How CAN Works
5
The Commercial Tools
6
Open Source Tools
7
Design Goals
8
Design Choices
9
Trace
10
ISOTP
11
Diagnostics
12
Scripting
13
What's Next
14
Bonus: go-cantact
15
Emerging Tech
16
Questions?
Description:
Explore the world of automotive security and Controller Area Network (CAN) exploitation in this 35-minute conference talk from NorthSec. Dive into the CANtact open-source hardware tool, designed for low-cost CAN to USB conversion and bus access. Learn about the new CANtact software, specifically created for reverse engineering and fuzzing CAN systems. Discover how to view CAN traffic, decode messages, and perform diagnostic actions in a graphical environment. Gain insights into analysis techniques for reverse engineering CAN systems, understand the design goals and choices behind CANtact, and explore topics such as tracing, ISOTP, diagnostics, and scripting. Get a glimpse of emerging technologies in automotive security and participate in a Q&A session to deepen your understanding of this critical field.

CANtact - An Open Tool for Automotive Exploitation

NorthSec
Add to list
0:00 / 0:00