View Single Post
Old 09-14-2021, 01:39 AM   #31 (permalink)
freebeard
Master EcoModder
 
freebeard's Avatar
 
Join Date: Aug 2012
Location: northwest of normal
Posts: 27,561
Thanks: 7,736
Thanked 8,554 Times in 7,041 Posts
Quote:
Originally Posted by JSH
I'm also not keen on making the details of OTA updates public as RTR advocates would like. Manufactures are working hard to make ever increasingly connect cars secure from hackers. It seems stupid to just give them all the code.
That would be called Security Through Obscurity. You can't lock something down if you put an example in each customer's hand.

OTOH the Tesla backend is running the Dojo chip, or will be soon. Reverse engineer that.

archive.org/details/car-hackers-handbook-the

Quote:
Download the book for free!
....

Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more *convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving *millions vulnerable to attack.

The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern *vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and *between devices and systems.

Then, once you have an understanding of a *vehicle’s communication network, you’ll learn how to *intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and *ChipWhisperer, The Car Hacker’s Handbook will show you how to:
Build an accurate threat model for your vehicle
Reverse engineer the CAN bus to fake engine signals
Exploit vulnerabilities in diagnostic and data-logging systems
Hack the ECU and other firmware and embedded systems
Feed exploits through infotainment and vehicle-to-vehicle communication systems
Override factory settings with performance-tuning techniques
Build physical and virtual test benches to try out exploits safely
If you’re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker’s Handbook your first stop.

__________________
.
.
Without freedom of speech we wouldn't know who all the idiots are. -- anonymous poster

____________________
  Reply With Quote