Difference between revisions of "The Car Hacker's Handbook: A Guide for the Penetration Tester"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(Automatic literature update)
Line 1: Line 1:
[[File:The Car Hacker's Handbook.jpg|500px]]
{{Literature|device_name=The Car Hacker's Handbook: A Guide for the Penetration Tester|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-K2jOgBlO4r.jpeg|type=Book|author=Craig Smith|language=English|isbn=978-1593277031|publisher=No Starch Press (2016)|pages=304|references=https://nostarch.com/carhacking|description="Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more ­convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving ­millions vulnerable to attack.
=== Information ===
{| class="wikitable"
|-
| Type
| Book
|-
| Author
| Craig Smith
|-
| Language
| English
|-
| Publisher
| No Starch Press (2016)
|-
| ISBN
| 978-1593277031
|-
| Pages
| 304
|-
|}
 
=== Book Description ===
 
"Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more ­convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving ­millions vulnerable to attack.


The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern ­vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and ­between devices and systems.
The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern ­vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and ­between devices and systems.


Then, once you have an understanding of a ­vehicle’s communication network, you’ll learn how to ­intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ­ChipWhisperer, The Car Hacker’s Handbook will show you how to:
Then, once you have an understanding of a ­vehicle’s communication network, you’ll learn how to ­intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ­ChipWhisperer, The Car Hacker’s Handbook will show you how to:
* Build an accurate threat model for your vehicle
* Build an accurate threat model for your vehicle
* Reverse engineer the CAN bus to fake engine signals
* Reverse engineer the CAN bus to fake engine signals
Line 36: Line 11:
* Feed exploits through infotainment and vehicle-to-vehicle communication systems
* Feed exploits through infotainment and vehicle-to-vehicle communication systems
* Override factory settings with performance-tuning techniques
* Override factory settings with performance-tuning techniques
* Build physical and virtual test benches to try out exploits safely"<ref name="nostarch.com"> https://nostarch.com/carhacking </ref>
* Build physical and virtual test benches to try out exploits safely&quot;}}
== References ==
<references />
 
 
[[Category:Literature]]

Revision as of 23:16, 8 April 2021

accessory-image-K2jOgBlO4r.jpeg

Information
Type Book
Author Craig Smith
Language English
Publisher No Starch Press (2016)
ISBN 978-1593277031
Pages 304

Book Description

"Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more ­convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving ­millions vulnerable to attack.

The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern ­vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and ­between devices and systems.

Then, once you have an understanding of a ­vehicle’s communication network, you’ll learn how to ­intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ­ChipWhisperer, The Car Hacker’s Handbook will show you how to:

  • Build an accurate threat model for your vehicle
  • Reverse engineer the CAN bus to fake engine signals
  • Exploit vulnerabilities in diagnostic and data-logging systems
  • Hack the ECU and other firmware and embedded systems
  • Feed exploits through infotainment and vehicle-to-vehicle communication systems
  • Override factory settings with performance-tuning techniques
  • Build physical and virtual test benches to try out exploits safely"

References

https://nostarch.com/carhacking