Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Car Hacking - Practical Guide to Automotive Security

Hack In The Box Security Conference via YouTube

Overview

This course provides a practical guide to automotive security, focusing on reverse-engineering Controller Area Network (CAN) bus packets using an Instrument Cluster Simulator. The learning outcomes include understanding vehicle networks, ECU, vehicle protocols, CAN bus protocol, reverse engineering of CAN bus, identifying arbitration IDs, replay attacks, sending commands on the CAN bus, and using hardware tools. The teaching method involves a lecture-style presentation with a demonstration of practical tools. The intended audience for this course includes cybersecurity professionals, IoT security enthusiasts, hardware hackers, and individuals interested in automotive security.

Syllabus

Intro
How does a modern car function?
Complexity in a modern car
Your car, is a computer and a network!
Electronics Control Unit (ECU's)
History of Car Hacking
Identifying attack surface
Attack surface on a modern vehicle - Bird's Eye view
Network within the Car
CAN Bus explained
CAN data frame
CAN message Identifier
CAN message structure
How does the CAN message actually look like
Getting on the CAN Bus
Hardware/Software Needed
OBD-II connectors - CAN Hardware
CAN Software
Myth or Fact: Entry barrier for Car/CAN hacking is high
ICSim: Instrument Cluster Simulator
General methodology for CAN hacking
Setting up the ICSim
Fun tip! Dos Your Car!

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Car Hacking - Practical Guide to Automotive Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.