Cars are no longer simply mechanical. While they may be getting more advanced that doesn’t mean they are immune to hacks. One particularly sensitive entry point for hacking a car is the legally required OBD II port, which is basically “the Ethernet jack for your car”. This port works on a signaling protocol called CAN which is a de facto standard for the in-vehicle network. However, a lack in security features of the CAN protocol makes vehicles vulnerable to attacks.
This session introduces the basic theory about the CAN bus and how vulnerable it is. We will provide an Instrument Cluster Simulator to get hands-on experience of hacking a real car by creating a functioning CAN simulator with a dashboard, just like the one in your car, and will conduct attacks on it. From setting up a car hacking virtual lab, sniffing traffic, reverse engineering to fully pwning the car network, this session will cover everything from basics to advanced. Attendees will be able to reproduce attacks on their system right there as well as at their home without the need of any hardware as everything will be done on a real-world simulation of a Car Instrument Cluster.