Overview
Explore a 38-minute Black Hat conference presentation detailing successful exploits of vulnerabilities in three EV-chargers during the first Pwn2Own Automotive event in Tokyo (January 2024). Learn how Computest Sector 7 researchers executed arbitrary code on charging stations using only Bluetooth connectivity, demonstrating both the ease of discovering firmware vulnerabilities and the straightforward nature of exploit development due to insufficient binary exploitation protections. Gain insights into specific vulnerabilities, exploit development techniques, and broader IoT security implications through detailed explanations from security researchers Thijs Alkemade and Khaled Nassar, along with Head of Security Research Daan Keuper.
Syllabus
Low Energy to High Energy: Hacking Nearby EV-Chargers Over Bluetooth
Taught by
Black Hat