Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-vehicle-security
🚗 A curated list of resources for learning about vehicle security and car hacking
https://github.com/samyk/awesome-vehicle-security
Last synced: 4 days ago
JSON representation
-
Articles
- Anatomy of the Rolljam Wireless Car Hack - Overview of the RollJam rolling code exploitation device.
- Stopping a Jeep Cherokee on the Highway Remotely - Chris Valasek's and Charlie Miller's pivotal research on hacking into Jeep's presented at DEFCON in 2015.
- Troy Hunt on Controlling Nissans - Troy Hunt goes into controlling Subaru vehicles.
- Tesla hackers explain how they did it at Defcon - Overview of DEFCON 23 presentation on hacking into Tesla cars.
- Anatomy of the Rolljam Wireless Car Hack - Overview of the RollJam rolling code exploitation device.
-
Podcasts and Episodes
-
Episodes
- This article
- ELM327 - The de facto chipset that's very cheap and can be used to connect to CAN devices.
- Car Hacking with Craig Smith - Software Engineering Daily did an amazing episode with Craig Smith, author of the Car Hacking Handbook (above), on hacking into vehicles.
- Big Bugs Podcast Episode 1: Auto Bugs - Critical Vulns found in Cars with Jason Haddix - Jason Haddix explores major vulnerabilities found in cars.
- Hacking Under the Hood and Into Your Car - Chris Valasek and Charlie Miller discuss with NPR how they were able to hack into vehicles.
- Hacking Connected Vehicles with Chris Valasek of IOActive - Chris Valasek talks about hacking into connected vehicles.
- This article
- Arduino - Arduino's have a number of shields you can attach to connect to CAN-enabled devices.
- ChuangZhou CAN-Bus Shield
- DFRobot CAN-BUS Shield For Arduino
- SparkFun CAN-BUS Shield
- Freematics OBD-II Telematics Kit - Arduino-based OBD-II Bluetooth adapter kit has both an OBD-II device and a data logger, and it comes with GPS, an accelerometer and gyro, and temperature sensors.
- GoodThopter12 - Crafted by a well-known hardware hacker, this board is a general board that can be used for exploration of automotive networks.
- Red Pitaya - Replaces expensive measurement tools such as oscilloscopes, signal generators, and spectrum analyzers. Red Pitaya has LabView and Matlab interfaces, and you can write your own tools and applications for it. It even supports extensions for things like Arduino shields.
- ChipWhisperer - A system for side-channel attacks, such as power analysis and clock glitching.
- HackerSDR - A Software Defined Radio peripheral capable of transmission or reception of radio signals from 1 MHz to 6 GHz. Designed to enable test and development of modern and next generation radio technologies.
- USB2CAN - Cheap USB to CAN connector that will register a device on linux that you can use to get data from a CAN network.
- CANtact - "The Open Source Car Tool" designed to help you hack your car. You can buy one or make your own following the guide here.
-
Podcasts
- Security Weekly - Excellent podcast covering all ranges of security, with some episodes focusing portions on vehicle security from cars to drones.
- TrustedSec Podcast - From the people at TrustedSec, leaders in Social Engineering, their episodes often go into recent vehicle vulnerabilities and exploits.
- SANS Internet Storm Center - A regular podcast going into the latest vulnerabilities and security news.
- Security Ledger - A podcast focusing on interviewing security experts about topics related to security.
-
-
Presentations
- "Hopping on the CAN Bus" from BlackHat Asia 2015 - A talk from BlackHat Asia 2015 that by the end the audience should "gain an understanding of automotive systems, but will also have the tools to attack them".
- "Drive It Like You Hacked It" from DEFCON 23 - A talk and slides from Samy Kamkar's DEFCON 23/2015 talk that includes hacking garages, exploiting automotive mobile apps, and breaking rolling codes to unlock any vehicle with low cost tools.
-
Books
- 2014 Car Hacker's Handbook - Free guide to hacking vehicles from 2014. You can also buy the book on Amazon [here](https://www.amazon.com/Car-Hackers-Manual-Craig-Smith/dp/0990490106?ie=UTF8&keywords=2014%20car%20hacker%27s%20manual&qid=1405445024&ref_=sr_1_1&sr=8-1).
- 2016 Car Hacker's Handbook - Latest version of the Car Hacker's handbook with updated information to hack your own vehicle and learning vehicle security.
- A Comprehensible Guide to Controller Area Network - An older book from 2005, but still a comprehensive guide on CAN busses and networking in vehicles.
- Controller Area Network Prototyping with Arduino - This book guides you through prototyping CAN applications on Arduinos, which can help when working with CAN on your own car.
- Embedded Networking with CAN and CANopen - From 2003, this book fills in gaps in CAN literature and will educate you further on CAN networks and working with embedded systems.
- A Comprehensible Guide to Controller Area Network - An older book from 2005, but still a comprehensive guide on CAN busses and networking in vehicles.
-
Videos
- Samy Kamkar on Hacking Vehicles with OnStar - Samy Kamkar, the prolific hacker behind the Samy worm on MySpace, explores hacking into vehicles with OnStar systems.
-
Websites
- DEFCON Car Hacking Village - Car Hacking exercises from DEFCON 24.
- canbushack: Hack Your Car - Course on Vehicle Hacking.
- OWASP Internet of Things Project - OWASP's project to secure IoT, from cars to medical devices and beyond.
- IAmTheCalvary - Global organization backed by major internet companies pushing standards to secure IoT devices.
- OpenGarages - Provides public access, documentation and tools necessary to understand today's modern vehicle systems.
- canbushack: Hack Your Car - Course on Vehicle Hacking.
-
Who to Follow
-
Applications
-
Episodes
- WireShark - WireShark can be used for reversing CAN communications.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- RomRaider - An open source tuning suite for the Subaru engine control unit that lets you view and log data and tune the ECU.
- O2OO - Works with the ELM327 to record data to a SQLite database for graphing purposes. It also supports reading GPS data. You can connect this to your car and have it map out using Google Maps KML data where you drive.
- Intrepid Tools - Expensive, but extremely versatile tools specifically designed for reversing CAN and other vehicle communication protocols.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- Kayak - Java application for CAN bus diagnosis and monitoring.
-
-
Python
-
Episodes
- CANard - A Python framework for Controller Area Network applications.
-
-
Go
-
Episodes
- UberATC - Uber Advanced Technologies Center - <[email protected]>
- Tesla - Tesla hires security professionals for a variety of roles, particularly securing their vehicles.
- Intrepid Control Systems - Embedded security company building tools for reversing vehicles.
- Rapid7 - Rapid7 does work in information, computer, and embedded security.
- IOActive - Security consulting firm that does work on pentesting hardware and embedded systems.
- Application Security
- Security
- Capture the Flag
- Malware Analysis
- Android Security
- Hacking
- Honeypots
- Incident Response
- contribution guidelines
-
Programming Languages
Categories
Sub Categories
Keywords
awesome
6
security
5
awesome-list
5
list
4
dynamic-analysis
1
drop-ice
1
domain-analysis
1
chinese-translation
1
chinese
1
automated-analysis
1
analysis-framework
1
penetration
1
ctf
1
security-experts
1
reading-list
1
owasp
1
curated
1
application-security
1
incident-response-tooling
1
incident-response
1
dfir
1
cybersecurity
1
honeypot
1
honeyd
1
hacking
1
android
1
threatintel
1
threat-sharing
1
threat-intelligence
1
static-analysis
1
network-traffic
1
malware-samples
1
malware-research
1
malware-collection
1
malware-analysis
1