Главная
Study mode:
on
1
Intro
2
Source view
3
Memory view
4
Fill with ArrayStorage
5
Refill with Uint32Array
6
Explore Kernel
7
QtCarBrowser AppArmor rules
8
Fix solution in V2
9
Gateway file operation protocol
10
Gateway diagnostic protocol
11
Gateway update
12
Filesystem of the gateway
13
OTA Overview
14
Cloud - Car: Firmware Deploy
15
Ethernet Connected ECUs - Step 1
16
Traditional ECUs: In Bundle
17
Traditional ECUs: Firmware Info
18
Traditional ECUS: Create and Send Files
19
How Easter egg works?
20
Triggers on CID
21
Start on BCCEN
22
Easter egg start
23
How we patch
24
Patch in CID
25
Reverse of ECUS
26
Patch of BCCEN
27
Patch of BCFRONT
28
Autopilot ECU
29
Ape-updater
30
Commands for update
31
m3_factory_deploy
32
Exploit
33
Get Root
34
Fixed by Tesla
35
Fully Compromised
36
Tesla's Response
37
Security Enhancement
Description:
Explore the intricacies of remotely compromising Tesla car systems in this Black Hat conference presentation. Delve into the technical details of exploiting multiple zero-day vulnerabilities across various in-vehicle components, including the Gateway, BCM, and Autopilot ECUs. Learn about the inner workings of over-the-air technology and the new attack chain developed during Tesla hacking in 2017. Examine topics such as memory manipulation, kernel exploration, AppArmor rules, firmware deployment processes, and the exploitation of Easter egg functionalities. Gain insights into the presenters' methods for achieving root access, patching different ECUs, and fully compromising Tesla vehicles. Understand Tesla's response to these findings and subsequent security enhancements implemented to address the vulnerabilities.

Over-the-Air - How We Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars

Black Hat
Add to list
0:00 / 0:00