SlideShare a Scribd company logo
Let’s Get Started With
Car Hacking
By Ankit Joshi
#WhoAmI
Ankit Joshi aka BH4
Security Analyst with Net-square Pvt. Ltd.
Red Teamer
➢ Understanding Threat
Models
➢ CAN Protocol
➢ Other Protocol
➢ ECU
➢ Play With Can Bus
➢ From Where You Can Start
Content
Understanding Threat Models
In 2017, 50%+ Model are
vulnerable to 8 or more than
8 remote attack surface
from different mackers.
Lets get started with car hacking - Ankit Joshi
List Of Car Component’s
General Vulnerability Found in Car
Hard Coded or Non-existence of Bluetooth Pin.
Can Packet Injection.
Weak Wpa2 Passwords.
Admin Consoles Open For Internet.
Insecure Firmware Updates And Downloads.
CAN (Controlled Area Network)
CAN is the central nervous system that enables communication
between all/some parts of the car.
CAN was originally developed by BOSCH in 1985 as an intra-vehicular
communication system.
The main motive of proposing CAN was that it allowed multiple ECU to
be communicated with only a single wire. A modern car can have as
much as 70 ECUs
Lets get started with car hacking - Ankit Joshi
Working Of CAN Frame
A CAN frame has 3 major parts
● Arbitration Identifier
● Data Length Code
● Data field
CAN runs on two wires: CAN high (CANH) and CAN low (CANL).
Can Bus Frame
CAN pins cable view on the OBD-II connector
OBD (Onboard Diagnostics)
CAN Bus Waveforms
Other Protocol
The CANopen Protocol.
The GMLAN Bus.
The ISO-TP Protocol.
The SAE J1850 Protocol.
The PWM Protocol.
The VPW Protocol.
ECU (Electronic Control Unit)
IC Embedded Circuits
Reads Data From Sensors
❖ Temperature
❖ Tyre Pressure
❖ Engine Fluids
❖ Many more
Lets get started with car hacking - Ankit Joshi
Types Of ECU
Main ECU
❖ ECM -> Engine Control Module.
❖ EBCM -> Electronic Brake Control Module.
❖ PCM -> Power Control Module.
32- Bit 40 Mhz Processor With Code Size of 1 mb Max .
From Where You Can Start
http://opengarages.org/handbook/ebook/#calibre_link-382
https://www.slideshare.net/getcarloop/car-hacking-101
https://medium.com/supplyframe-hardware/def-con-27-car-hacking-village-eb
471a02b93a
https://medium.com/@tbruno25/car-hacking-the-can-bus-tutorial-i-wish-i-had-
783d7e0a2046
And Google
Lets get started with car hacking - Ankit Joshi
Lets get started with car hacking - Ankit Joshi

More Related Content

PDF
202_camera ready_RTEICT_16_prasanth (1)
DOC
Voice operated home appliance control
PPT
Ethernet sniffer project
PPTX
CAN Bus and OBD-II
PDF
IP PHONES - *astTECS
DOC
Pap2 T Sip 3
PDF
What Is Obd Scan Tool Presentation Mp3 Car Afk Fest 2009
PPTX
UGM CAN PXI
202_camera ready_RTEICT_16_prasanth (1)
Voice operated home appliance control
Ethernet sniffer project
CAN Bus and OBD-II
IP PHONES - *astTECS
Pap2 T Sip 3
What Is Obd Scan Tool Presentation Mp3 Car Afk Fest 2009
UGM CAN PXI

Similar to Lets get started with car hacking - Ankit Joshi (20)

PDF
Embedded One.pdf
PPTX
Overview of automotive network protocol
PPTX
Controller Area Network (CAN) Different Types
PDF
PDF
How to Hack Your Mini Cooper. Reverse Engineering CAN Messages on Passenger A...
PPTX
Controller area network (can bus)
PDF
Current state of automotive network security
DOCX
11.chapters
DOCX
VineeshKumar_Resume
DOCX
16.An Intelligent Data-Driven Model to Secure Intravehicle Communications Bas...
PDF
Edmunds presentation
PDF
Can Protocol For Automobiles
PDF
Automotive Linux, Cybersecurity and Transparency
PDF
Next-Gen In-Vehicle Software Opportunities
DOCX
Smart home automation system
PDF
Epma 013
PDF
The next frontier: open source in the car
DOCX
Bluetooth Controlled Robot Project Report
PDF
OSGi Technology in the Vehicle - H U Michel
PDF
Tesla Hacking to FreedomEV
Embedded One.pdf
Overview of automotive network protocol
Controller Area Network (CAN) Different Types
How to Hack Your Mini Cooper. Reverse Engineering CAN Messages on Passenger A...
Controller area network (can bus)
Current state of automotive network security
11.chapters
VineeshKumar_Resume
16.An Intelligent Data-Driven Model to Secure Intravehicle Communications Bas...
Edmunds presentation
Can Protocol For Automobiles
Automotive Linux, Cybersecurity and Transparency
Next-Gen In-Vehicle Software Opportunities
Smart home automation system
Epma 013
The next frontier: open source in the car
Bluetooth Controlled Robot Project Report
OSGi Technology in the Vehicle - H U Michel
Tesla Hacking to FreedomEV

More from NSConclave (20)

PDF
RED-TEAM_Conclave
PPTX
Create a Custom Plugin in Burp Suite using the Extension
PPTX
IOT SECURITY ASSESSMENT Pentester's Approach
PPTX
Debugging Android Native Library
PPTX
Burp Suite Extension Development
PDF
Log Analysis
PDF
Regular Expression Injection
PDF
HTML5 Messaging (Post Message)
PDF
Node.js Deserialization
PDF
RIA Cross Domain Policy
PDF
LDAP Injection
PDF
Python Deserialization Attacks
PDF
Sandboxing
PDF
NoSql Injection
PDF
Thick Client Testing Advanced
PDF
Thick Client Testing Basics
PDF
Markdown
PDF
Docker 101
PDF
Security Architecture Consulting - Hiren Shah
PDF
OSINT: Open Source Intelligence - Rohan Braganza
RED-TEAM_Conclave
Create a Custom Plugin in Burp Suite using the Extension
IOT SECURITY ASSESSMENT Pentester's Approach
Debugging Android Native Library
Burp Suite Extension Development
Log Analysis
Regular Expression Injection
HTML5 Messaging (Post Message)
Node.js Deserialization
RIA Cross Domain Policy
LDAP Injection
Python Deserialization Attacks
Sandboxing
NoSql Injection
Thick Client Testing Advanced
Thick Client Testing Basics
Markdown
Docker 101
Security Architecture Consulting - Hiren Shah
OSINT: Open Source Intelligence - Rohan Braganza

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Spectroscopy.pptx food analysis technology
PPT
Teaching material agriculture food technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
sap open course for s4hana steps from ECC to s4
Encapsulation_ Review paper, used for researhc scholars
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectroscopy.pptx food analysis technology
Teaching material agriculture food technology
NewMind AI Weekly Chronicles - August'25 Week I
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
“AI and Expert System Decision Support & Business Intelligence Systems”
Programs and apps: productivity, graphics, security and other tools
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
The AUB Centre for AI in Media Proposal.docx
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
sap open course for s4hana steps from ECC to s4

Lets get started with car hacking - Ankit Joshi

  • 1. Let’s Get Started With Car Hacking By Ankit Joshi
  • 2. #WhoAmI Ankit Joshi aka BH4 Security Analyst with Net-square Pvt. Ltd. Red Teamer
  • 3. ➢ Understanding Threat Models ➢ CAN Protocol ➢ Other Protocol ➢ ECU ➢ Play With Can Bus ➢ From Where You Can Start Content
  • 4. Understanding Threat Models In 2017, 50%+ Model are vulnerable to 8 or more than 8 remote attack surface from different mackers.
  • 6. List Of Car Component’s
  • 7. General Vulnerability Found in Car Hard Coded or Non-existence of Bluetooth Pin. Can Packet Injection. Weak Wpa2 Passwords. Admin Consoles Open For Internet. Insecure Firmware Updates And Downloads.
  • 8. CAN (Controlled Area Network) CAN is the central nervous system that enables communication between all/some parts of the car. CAN was originally developed by BOSCH in 1985 as an intra-vehicular communication system. The main motive of proposing CAN was that it allowed multiple ECU to be communicated with only a single wire. A modern car can have as much as 70 ECUs
  • 10. Working Of CAN Frame A CAN frame has 3 major parts ● Arbitration Identifier ● Data Length Code ● Data field CAN runs on two wires: CAN high (CANH) and CAN low (CANL).
  • 12. CAN pins cable view on the OBD-II connector OBD (Onboard Diagnostics)
  • 14. Other Protocol The CANopen Protocol. The GMLAN Bus. The ISO-TP Protocol. The SAE J1850 Protocol. The PWM Protocol. The VPW Protocol.
  • 15. ECU (Electronic Control Unit) IC Embedded Circuits Reads Data From Sensors ❖ Temperature ❖ Tyre Pressure ❖ Engine Fluids ❖ Many more
  • 17. Types Of ECU Main ECU ❖ ECM -> Engine Control Module. ❖ EBCM -> Electronic Brake Control Module. ❖ PCM -> Power Control Module. 32- Bit 40 Mhz Processor With Code Size of 1 mb Max .
  • 18. From Where You Can Start http://opengarages.org/handbook/ebook/#calibre_link-382 https://www.slideshare.net/getcarloop/car-hacking-101 https://medium.com/supplyframe-hardware/def-con-27-car-hacking-village-eb 471a02b93a https://medium.com/@tbruno25/car-hacking-the-can-bus-tutorial-i-wish-i-had- 783d7e0a2046 And Google