top of page
Writer's pictureInfosec In the City (IIC)

Automating & Tooling Your Own CAN Hacking Tool On a Cheap Car Hacking Adventure — by Jay Turla

Updated: Dec 26, 2020

SINCON 2020 Conference Insights Track


Day 1 (2 Jan 2021)

2.30pm—3.15pm

@ Main Stage



Abstract

In this talk, we don't need roads. Seat tight and no need to fasten your seatbelts because this will be a quick, cheap, practical and dirty approach in car hacking specifically CAN Bus hacking. Using one component of your car you could just acquire from a junkyard or by any means necessary to start Car Hacking by yourself from fuzzing a simulator to actual hardware with open source tools and hardware. We will also talk about building your own lost-cost CAN fuzzer and Metasploit module creation geared towards the hwbridge.


Main topics and points:

  • Hacking Your Low Cost Hardware

  • Playing with nano-can

  • Python for Car Hackers

  • Introduction to Metasploit's hwbridge modules

  • Creating your own Metasploit module for car hacking

Warning: this talk could produce future car hackers who will be at your nearest Car Hacking Village and bug bashes.


About Jay Turla

JAY TURLA is a Manager, Security Operations (PH) at Bugcrowd Inc., and one of the goons of ROOTCON. He has been acknowledged and rewarded by Facebook, Adobe, Yahoo, Microsoft, Mozilla, etc. for his responsible disclosures. He has also contributed auxiliary and exploit modules to the Metasploit Framework. He has presented at ROOTCON, HITCON, PEHCON, DEFCON’s Packet Hacking Village, DragonCon, Bsides Myanmar, Nullcon and TCON. He used to work for HP Fortify where he performed Vulnerability Assessment, Remediation and Advance Testing. His main interest or research right now is about car hacking and is currently one of the main organizers of the Car Hacking Village of ROOTCON / Philippines which is recognized and supported by the Car Hacking Village community.

170 views0 comments

Komentáře


Post: Blog2_Post
bottom of page