Attack surface on a modern vehicle - Bird's Eye view
9
Network within the Car
10
CAN Bus explained
11
CAN data frame
12
CAN message Identifier
13
CAN message structure
14
How does the CAN message actually look like
15
Getting on the CAN Bus
16
Hardware/Software Needed
17
OBD-II connectors - CAN Hardware
18
CAN Software
19
Myth or Fact: Entry barrier for Car/CAN hacking is high
20
ICSim: Instrument Cluster Simulator
21
General methodology for CAN hacking
22
Setting up the ICSim
23
Fun tip! Dos Your Car!
Description:
Dive into the world of automotive cybersecurity with this practical guide presented at HITB CyberWeek. Explore the intricacies of modern vehicle systems, focusing on the Controller Area Network (CAN bus) and its vulnerabilities. Learn reverse-engineering techniques for CAN bus packets using the Instrument Cluster Simulator (ICSim). Gain insights into vehicle networks, ECUs, protocols, and the CAN Bus protocol. Discover how to identify arbitration IDs for specific vehicle events, perform replay attacks, and send commands on the CAN Bus. Get introduced to essential hardware tools for car hacking. Understand the complexity of contemporary cars as powerful computer systems on wheels, and explore the history of car hacking and potential attack surfaces. Set up ICSim and learn general methodologies for CAN hacking, including a fun tip on how to DoS your car. This comprehensive talk, delivered by Yogesh Ojha, a Cyber Security Analyst at Tata Consultancy Services, provides valuable knowledge for both cybersecurity professionals and automotive enthusiasts interested in the intersection of technology and vehicle security.
Read more
Car Hacking - Practical Guide to Automotive Security