Главная
Study mode:
on
1
Intro
2
Remote Attack Paradigm
3
2014 Jeep Cherokee
4
Problems with attacks over Wi-Fi
5
WPA2 password
6
Password guessing
7
Setting the time
8
D-Bus Overview
9
D-Bus Command Line Injection
10
GPS Tracker 3000
11
Radio Volume
12
Netstat Review
13
Femto-Cell Comms
14
Long Distance Communications (Sprint)
15
Updating the V850: Firmware
16
WITECH: Security Unlocks
17
PAM: Checksum Code
18
The patch...
19
Conclusions
Description:
Explore a comprehensive conference talk on remote exploitation of unaltered passenger vehicles. Delve into the reality of car hacking as experts demonstrate a step-by-step remote attack on a factory vehicle. Learn about pivoting through various hardware components to send CAN bus messages to critical electronic control units. Discover the process of chaining multiple elements to affect physical systems, and understand the true capabilities and limitations of remote car attacks. Gain insights into topics such as remote attack paradigms, Wi-Fi vulnerabilities, password guessing, D-Bus command line injection, GPS tracking, radio volume manipulation, long-distance communications, firmware updates, security unlocks, and checksum codes. Conclude with a discussion on the implications and potential solutions for automotive cybersecurity.

Remote Exploitation of an Unaltered Passenger Vehicle

Black Hat
Add to list