Главная
Study mode:
on
1
Intro
2
Title
3
Funding
4
Outline
5
DC Charging
6
Charging Standards
7
Why Study Electric Charging
8
Attack Surface
9
Charging
10
Section X
11
XCharger
12
Why
13
Use
14
Exchange
15
Compass
16
Identity Authentication
17
Charging Communication
18
Architecture
19
Authentication
20
Attack Script
21
Ruler of Exchange
22
Communication
23
Charging Standard
24
ISO 1511A
25
Thank you
Description:
Explore the security vulnerabilities in DC fast charging protocols for electric vehicles in this 27-minute conference talk from the Hack In The Box Security Conference. Dive into global fast charging standards and communication protocols, and learn how to build an X-in-the-Middle attack environment. Discover the "XCharger" security test tool for capturing, modifying, replaying, and fuzzing data packets during the charging process. Gain insights on analyzing private charging pile agreements of a well-known electric vehicle manufacturer and exploiting protocol vulnerabilities to achieve free charging and manipulate voltage and current limits. Presented by Wu HuiYu and YuXiang Li, senior security researchers from the Tencent Blade Team, this talk covers topics such as charging standards, attack surfaces, identity authentication, and charging communication architecture.

Attacking Fast Charging Electric Vehicles

Hack In The Box Security Conference
Add to list