In this talk, you’ll learn how to hack your car’s Controller Area Network (CAN) bus using a new open source toolkit. Recent papers and talks on automotive security have shown that automotive systems have many security flaws. One particularly vulnerable component is a vehicle’s CAN bus, which was never designed to be secure in the first place. We know the CAN bus is not secure, but how do we go about exploiting it? Commercial tools which are commonly used are quite expensive, and open-source software support for the CAN protocol is limited. In this talk, we’ll take a look at how automotive manufacturers actually utilize CAN, and explore how we can interact with it using CANard: a new open-source toolkit for working with CAN. By using open-source tools, we can work towards sharing of information on automotive systems. This information is indispensable to those wishing to tinker with their cars. By the end of this talk, attendees will learn how to interact with a live CAN bus, and see a demo of these tools in action.