Главная
Study mode:
on
1
Shenanigans We Will Cover
2
What is a Vehicle Diagnostics Adapter (VDA)?
3
Attacker Plan
4
Reverse Hardware: Enumerate Components
5
Reverse Hardware: UART Time!
6
Obtain Firmware: UART Time!
7
Obtain Firmware, Reverse Format
8
Reverse Firmware Update
9
Super Complicated Update Procedure
10
Modify Firmware: Earth, Wind & Coldfire
11
Why is this a problem? (hypothetically)
12
Defender Problem
13
Defender Goal
14
Autotomic Binary Reduction (ABR)
15
Reverse Engineer Firmware - RTOS
16
Identify Feature Entry Points
17
ABR: Identify code & data to remove, and remove!
18
Defender Reflections
19
Cyber Truck Challenge -2-Hour Workshop using OFRAK and VDA
20
DC30 CHV CTF Challenges
21
Shenanigans We Covered
Description:
Learn how to attack and defend Vehicle Diagnostics Adapters (VDAs) in this DEF CON 31 security talk that explores hardware reverse engineering, firmware analysis, and automotive cybersecurity. Dive into the technical process of enumerating components, accessing UART interfaces, extracting and modifying firmware, and understanding update procedures for VDA devices commonly left behind in vehicles. Master defensive techniques including Autotomic Binary Reduction (ABR), RTOS firmware reverse engineering, and feature entry point identification. Explore real-world applications through the Cyber Truck Challenge workshop using OFRAK and VDA, while examining DC30 CHV CTF challenges. Gain practical insights into both offensive and defensive aspects of automotive security, with a focus on protecting these often overlooked vehicle components.

VDA Shenanigans: Attacking and Defending Vehicle Diagnostics Adapters

DEFCONConference
Add to list