This document provides an introduction to hacking vehicle systems. It discusses understanding a vehicle's attack surfaces and communication systems like the CAN bus. It encourages threat modeling to identify riskier entry points. The document then focuses on hacking infotainment systems, which often run operating systems that can be analyzed and modified by updating firmware, installing third-party apps, or directly accessing memory chips. The goal is to understand how vehicles work and validate their security.