The Car Hacker's Handbook: A Guide for the Penetration TesterNo Starch Press, 1 mrt 2016 - 304 pagina's Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle’s communication network, you’ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker’s Handbook will show you how to: –Build an accurate threat model for your vehicle –Reverse engineer the CAN bus to fake engine signals –Exploit vulnerabilities in diagnostic and data-logging systems –Hack the ECU and other firmware and embedded systems –Feed exploits through infotainment and vehicle-to-vehicle communication systems –Override factory settings with performance-tuning techniques –Build physical and virtual test benches to try out exploits safely If you’re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker’s Handbook your first stop. |
Inhoudsopgave
1 | |
Bus Protocols | 15 |
Vehicle Communication with SocketCAN | 35 |
Diagnostics and Logging | 51 |
Reverse Engineering the CAN Bus | 67 |
ECU Hacking | 91 |
Building and Using ECU Test Benches | 115 |
Attacking ECUs and Other Embedded Systems | 127 |
Weaponizing CAN Findings | 193 |
Attacking Wireless Systems with SDR | 209 |
Performance Tuning | 233 |
Tools of the Trade | 241 |
Diagnostic Code Modes and PIDs | 253 |
Creating Your Own Open Garage | 255 |
Abbreviations
| 261 |
263 | |
Overige edities - Alles bekijken
The Car Hacker's Handbook: A Guide for the Penetration Tester Craig Smith Gedeeltelijke weergave - 2016 |
The Car Hacker's Handbook: A Guide for the Penetration Tester Craig Smith Geen voorbeeld beschikbaar - 2016 |
Veelvoorkomende woorden en zinsdelen
algorithm arbitration ID attack automotive binary Bluetooth brute-force bytes can-utils can0 CANBus candump cansniffer certificate chapter chip ChipWhisperer clock command communication connected device diagnostic disassemble dmesg door driver DSRC DTCs Ethernet example exploit firmware FlexRay GENIVI glitch GNU Radio hacking hardware hash ICSim identify immobilizer implementation infotainment install interface ISO-TP IVI system JTAG K-Line Kayak Keeloq kernel key fob Linux Listing look manufacturer messages Metasploit mode module OBD-II OBD-II connector Open Garages open source OpenXC packets password payload PIDs pinout pins protocol reverse engineering RFID sensor serial shellcode shown in Figure signal slcan0 sniffer SocketCAN standard Table target test bench there’s threat model TPMS traffic transponder trigger tuning typically unlock update vcan0 vehicle vehicle’s vulnerabilities Wi-Fi wireless Wireshark wiring diagram write you’ll