Dude, WTF in My CAN!

Presented at Black Hat Asia 2014, Unknown date/time (Unknown duration)

In our previous presentation, we learned how did the security in some car ECUs work, and we demonstrated how it could be bypassed to modify their internal parameters, and even to recover a bricked ECU. All of this was done over K-Line, a protocol that was used on all vehicles up to 2010. This time, we will go one step further, introducing the security existing in modern CAN bus enabled vehicles, and of course, how it can be bypassed. We will show a custom made tool that costs less than $20 to build and that is able to access the CAN bus system, giving the possibility of taking control over a CAN enabled vehicle remotely just by hooking four wires.


Presenters:

  • Javier Vazquez Vidal - CarIT
    Javier is a 29-year-old who is passionate of technology, and is specialized in hardware and embedded systems security. He studied Electromechanics and Telecommunications, developing a passion for electronics and technology since his youth.
  • Alberto GarcĂ­a Illera as Alberto Garcia Illera
    Alberto Garcia Illera (@algillera) is a 25-year-old who is passionate about hacking and social engineering. Alberto studied mathematics and computer systems in Spain and has spent the past several years working as a professional penetration tester. Alberto has presented at several seminars where he has helped teach hacking techniques to large companies such as Microsoft, the Spanish government, and the cyberterrorism Spanish police department. At DEFCON 20 in Las Vegas, Alberto presented a talk titled, "How to Hack All the Transport Networks of a Country" that had a great repercussion. He has also spoken at ZeroNights in Moscow, Black Hat in Abu Dhabi, Infiltrate in Miami, DEFCON21 and Black Hat Arsenal in Vegas.

Links:

Similar Presentations: