- Seriously check this first ---> Awesome Vehicle Security List(github awesome lists)
- 101
- Blogposts/How-To's/Writeups
- Broadcasting Your Attack: Security Testing DAB Radio In Cars
- Tesla Model S JSON API (unofficial RE post)
- Tesla Model S JSON API (unofficial RE post)
- Cyber-attacks on vehicles P-I!
- Cyber-attacks on vehicles P-II!
- An Introduction to the CAN Bus: How to Programmatically Control a Car: Hacking the Voyage Ford Fusion to Change A/C Temperature
- CC1101-FSK
- Jam and replay attack on vehicle keyless entry systems.
- rf-jam-replay
- Jam and Replay Attack on Vehicular Keyless Entry Systems
- DMV
- Papers
- Talks & Presentations
- Hacking Cars with Python -Eric Evenchick PyCon 2017
- Modern cars are networks of computers, and a high end vehicle could have nearly 100 different computers inside. These devices control everything from the engine to the airbags. By understanding how these systems work, we can interface with vehicles to read data, perform diagnostics, and even modify operation. In this talk, we'll discuss pyvit, the Python Vehicle Interface Toolkit. This library, combined with some open source hardware, allows developers to talk to automotive controllers from Python. We will begin with an introduction to automotive networks, to provide a basis for understanding the tools. Next, we will look at the tools and show the basics of using them. Finally, we'll discuss real world applications of these tools, and how they're being used in the automotive world today.
- Adventures in Automotive Networks and Control Units
- Charlie Miller & Chris Valasek
- Broadcasting your attack: Security testing DAB radio in cars - Andy Davis
- A Survey of Remote Automotive Attack Surfaces - Black Hat USA 2014
- Broadcasting your attack: Security testing DAB radio in cars - Andy Davis
- A Vulnerability in Modern Automotive Standards and How We Exploited It
- Car hacking: getting from A to B with Eve (SHA2017)
- Car security is, not surprisingly, a hot topic; after all they are fast and heavy computer controlled machinery that nowadays come with all kinds of internet connectivity. So we decided to have a look at it. In our presentation, we’ll first cover some theory behind the IT-part of car architecture. We’ll discuss attack vectors and their likelihood of success, and then discuss the various vulnerabilities we found. Finally, we will combine these vulnerabilities into a remote attack. Depending on the disclosure process with the vendor, which is pending, we might be able to demonstrate the attack.
- Hacking Cars with Python -Eric Evenchick PyCon 2017
- Tools
- Hardware
- CBM - The Bicho
- For the first time, a hardware backdoor tool is presented having several advanced features, such as: remote control via SMS commands, automated launch of attack payloads at a GPS location or when a specific car status is reached; and a configuration interface that allows users to create attack payloads in an easy manner. Have you ever imagined the possibility of your car being automatically attacked based on its GPS coordinates, its current speed or any other set of parameters? Now it's possible :-)
- The OpenXC Platform
- OpenXC™ is a combination of open source hardware and software that lets you extend your vehicle with custom applications and pluggable modules.
- CBM - The Bicho
- Software
- CANBus Triple
- General purpose Controller Area Network swiss army knife / development platform.
- Yet Another Car Hacking Tool
- CANToolz
- CANToolz is a framework for analysing CAN networks and devices. This tool based on different modules which can be assembled in pipe together and can be used by security researchers and automotive/OEM security testers for black-box analysis and etc. You can use this software for ECU discovery, MITM testing, fuzzing, bruteforcing, scanning or R&D testing and validation
- canspy
- Very simple tool for users who need to interface with a device based on CAN (CAN/CANopen/J1939/NMEA2000/DeviceNet) such as motors, sensors and many other devices.
- CBM - The Bicho
- For the first time, a hardware backdoor tool is presented having several advanced features, such as: remote control via SMS commands, automated launch of attack payloads at a GPS location or when a specific car status is reached; and a configuration interface that allows users to create attack payloads in an easy manner. Have you ever imagined the possibility of your car being automatically attacked based on its GPS coordinates, its current speed or any other set of parameters? Now it's possible :-)
- CANBus Triple
- Hardware
- QNX
- QNX Security Tools - Alex Plaskett & Georgi Geshev
- Random scripts produced as part of the research into QNX security. For more information please see the following publications:
- QNX Security Tools - Alex Plaskett & Georgi Geshev
-
Vehicle Telematics Security; getting it right - Andrew Tierney
-
Want to become an autonomous vehicle engineer? - Kyle Martin
-
FREE-FALL: TESLA HACKING 2016: Hacking Tesla from Wireless to CAN Bus - Keenlab
-
Getting your head under the hood and out of the sand: Automotive security testing - Andrew Tierney