Infosec In the City (IIC)
Automating & Tooling Your Own CAN Hacking Tool On a Cheap Car Hacking Adventure — by Jay Turla
Updated: Dec 26, 2020
SINCON 2020 Conference Insights Track
Day 1 (2 Jan 2021)
@ Main Stage
[SINCON 2020 Conference Full Schedule]
In this talk, we don't need roads. Seat tight and no need to fasten your seatbelts because this will be a quick, cheap, practical and dirty approach in car hacking specifically CAN Bus hacking. Using one component of your car you could just acquire from a junkyard or by any means necessary to start Car Hacking by yourself from fuzzing a simulator to actual hardware with open source tools and hardware. We will also talk about building your own lost-cost CAN fuzzer and Metasploit module creation geared towards the hwbridge.
Main topics and points:
Hacking Your Low Cost Hardware
Playing with nano-can
Python for Car Hackers
Introduction to Metasploit's hwbridge modules
Creating your own Metasploit module for car hacking
Warning: this talk could produce future car hackers who will be at your nearest Car Hacking Village and bug bashes.
About Jay Turla
JAY TURLA is a Manager, Security Operations (PH) at Bugcrowd Inc., and one of the goons of ROOTCON. He has been acknowledged and rewarded by Facebook, Adobe, Yahoo, Microsoft, Mozilla, etc. for his responsible disclosures. He has also contributed auxiliary and exploit modules to the Metasploit Framework. He has presented at ROOTCON, HITCON, PEHCON, DEFCON’s Packet Hacking Village, DragonCon, Bsides Myanmar, Nullcon and TCON. He used to work for HP Fortify where he performed Vulnerability Assessment, Remediation and Advance Testing. His main interest or research right now is about car hacking and is currently one of the main organizers of the Car Hacking Village of ROOTCON / Philippines which is recognized and supported by the Car Hacking Village community.