A curated list of awesome resources, books, hardware, software, applications, people to follow, and more cool stuff about vehicle security, car hacking, and tinkering with the functionality of your car.
I would love as much help as I can get. Start contributing!
Check out my blog or follow me on Twitter.
Legend:
- π: MOST AWESOME.
- π°: Costs money. π
- π Stopping a Jeep Cherokee on the Highway Remotely - Chris Valasek's and Charlie Miller's pivotal research on hacking into Jeep's presented at DEFCON in 2015.
- Troy Hunt on Controlling Nissans - Troy Hunt goes into controlling Nissan vehicles.
- Tesla hackers explain how they did it at Defcon - Overview of DEFCON 23 presentation on hacking into Tesla cars.
- Anatomy of the Rolljam Wireless Car Hack - Overview of the RollJam rolling code exploitation device.
- IOActive's Tools and Data - Chris Valasek and Charlie Miller release some of their tools and data for hacking into vehicles in an effort to get more people into vehicle security research.
- Developments in Car Hacking - via the SANS Reading Room, Currie's paper analyses the risks and perils of smart vehicle technology.
- "Hopping on the CAN Bus" from BlackHat Asia 2015 - A talk from BlackHat Asia 2015 that by the end the audience should "gain an understanding of automotive systems, but will also have the tools to attack them".
- "Drive It Like You Hacked It" from DEFCON 23 - A talk and slides from Samy Kamkar's DEFCON 23/2015 talk that includes hacking garages, exploiting automotive mobile apps, and breaking rolling codes to unlock any vehicle with low cost tools.
- Samy Kamkar on Hacking Vehicles with OnStar - Samy Kamkar, the prolific hacker behind the Samy worm on MySpace, explores hacking into vehicles with OnStar systems.
- Remote Exploitation of an Unaltered Passenger Vehicle - DEFCON 23 talk by Chris Valasek and Charlie Miller give their now famous talk on hacking into a Jeep remotely and stopping it dead in its tracks.
- Adventures in Automotive Networks and Control Units - DEFCON 21 talk by Chris Valasek and Charlie Miller on automotive networks.
- Can You Trust Autonomous Vehicles? - DEFCON 24 talk by Jianhao Liu, Chen Yan, Wenyuan Xu
- Ken Munro & Dave Lodge - Hacking the Mitsubishi Outlander & IOT - talk from BSides Manchester 2016 by Ken and Dave of Pen Test Partners
- π 2014 Car Hacker's Handbook - Free guide to hacking vehicles from 2014. You can also buy the book on Amazon here.
- ππ° 2016 Car Hacker's Handbook - Latest version of the Car Hacker's handbook with updated information to hack your own vehicle and learning vehicle security. For a physical copy as well unlimited PDF, MOBI, and EPUB copies of the book buy it at No Starch Press.
- π° A Comprehensible Guide to Controller Area Network - An older book from 2005, but still a comprehensive guide on CAN buses and networking in vehicles.
- π° Controller Area Network Prototyping with Arduino - This book guides you through prototyping CAN applications on Arduinos, which can help when working with CAN on your own car.
- π° Embedded Networking with CAN and CANopen - From 2003, this book fills in gaps in CAN literature and will educate you further on CAN networks and working with embedded systems.
- π OpenGarages - Provides public access, documentation and tools necessary to understand today's modern vehicle systems.
- DEFCON Car Hacking Village - Car Hacking exercises from DEFCON 24.
- canbushack: Hack Your Car - course on Vehicle Hacking methodology.
- OWASP Internet of Things Project - OWASP's project to secure IoT, from cars to medical devices and beyond.
- IAmTheCavalry - Global organization backed by major internet companies pushing standards to secure IoT devices.
- Carloop Community - Community of people interested in car hacking and connecting vehicles to the cloud.
- π Chris Valasek: Security Lead at UberATC
- π Charlie Miller: Hacked the first Apple iPhone, now does car security.
- π Samy Kamkar: Created MySpace Worm, RollJam, OwnStar.
- π Justin Seitz: Author of Black Hat Python (No Starch Press).
- π Troy Hunt: Pluralsight author. Microsoft Regional Director and MVP for Developer Security. Creator of haveibeenpwned.
- Ken Munro: British researcher, works at Pen Test Partners; major interest in vehicle security
- OpenGarages: Initiative to created Vehicle Research Labs around the world.
- Hackaday: Collaborative project hosting for hackers - there are frequently car projects on here.
- Pen Test Partners: British penetration testing firm; several posts concern their disclosed car security vulns
Podcasts and podcast episodes, that either directly focus on vehicle security or have some episodes on it.
- π Security Weekly - Excellent podcast covering all ranges of security, with some episodes focusing portions on vehicle security from cars to drones.
- TrustedSec Podcast - From the people at TrustedSec, leaders in Social Engineering, their episodes often go into recent vehicle vulnerabilities and exploits.
- SANS Internet Storm Center - the ISC run a regular podcast going into the latest vulnerabilities and security news.
- Security Ledger - A podcast focusing on interviewing security experts about topics related to security.
- π Car Hacking with Craig Smith - Software Engineering Daily did an amazing episode with Craig Smith, author of the Car Hacking Handbook (above), on hacking into vehicles.
- Big Bugs Podcast Episode 1: Auto Bugs - Critical Vulns found in Cars with Jason Haddix - Jason Haddix explores major vulnerabilities found in cars.
- Hacking Under the Hood and Into Your Car - Chris Valasek and Charlie Miller discuss with NPR how they were able to hack into vehicles.
- Hacking Connected Vehicles with Chris Valasek of IOActive - Chris Valasek talks about hacking into connected vehicles.
Overview of hardware, both open source and proprietary, that you can use when conducting vehicle security research. This article goes through many of the options below.
- π Arduino - Arduino boards have a number of shields you can attach to connect to CAN-enabled devices.
- CANtact - "The Open Source Car Tool" designed to help you hack your car. You can buy one or make your own following the guide here.
- Freematics OBD-II Telematics Kit - Arduino-based OBD-II Bluetooth adapter kit has both an OBD-II device and a data logger, and it comes with GPS, an accelerometer and gyro, and temperature sensors.
- π ELM327 - The de facto chipset that's very cheap and can be used to connect to CAN devices.
- GoodThopter12 - Crafted by a well-known hardware hacker, this board is a general board that can be used for exploration of automotive networks.
- USB2CAN - Cheap USB to CAN connector that will register a device on linux that you can use to get data from a CAN network.
- Intrepid Tools - Expensive, but extremely versatile tools specifically designed for reversing CAN and other vehicle communication protocols.
- Red Pitaya - Replaces expensive measurement tools such as oscilloscopes, signal generators, and spectrum analyzers. Red Pitaya has LabView and Matlab interfaces, and you can write your own tools and applications for it. It even supports extensions for things like Arduino shields.
- ChipWhisperer - A system for side-channel attacks, such as power analysis and clock glitching.
- HackerSDR - A Software Defined Radio peripheral capable of transmission or reception of radio signals from 1 MHz to 6 GHz. Designed to enable test and development of modern and next generation radio technologies.
- Carloop - Open source development kit that makes it easy to connect your car to the Internet. Lowest cost car hacking tool that is compatible with SocketCAN and can-utils. No OBD-II to serial cable required.
- CANBadger - A tool for reverse-engineering and testing automotive systems. The CANBadger consists of both hardware and software. The main interface is a LPC1768/LPC1769 processor mounted on a custom PCB, which offers two CAN interfaces, SD Card, a blinky LED, some GPIO pins, power supply for peripherals and the ethernet port.
- CANSPY - A platform giving security auditors to audit CAN devices. It can be used to block, forward or modify CAN frames on the fly autonomously as well as interactively.
- CANBus Triple - General purpose Controller Area Network swiss army knife and development platform.
- USBtin - USBtin is a simple USB to CAN interface. It can monitor CAN busses and transmit CAN messages. USBtin implements the USB CDC class and creates a virtual comport on the host computer.
Overview of software, both open source and proprietary, as well as libraries from various programming languages. This article goes through many of the options below.
Software applications that will help you hack your car, investigate it's signals, and general tinkering with it.
- π Wireshark - WireShark can be used for reversing CAN communications.
- Kayak - Java application for CAN bus diagnosis and monitoring.
- UDSim - GUI tool that can monitor a CAN bus and automatically learn the devices attached to it by watching communications.
- RomRaider - An open source tuning suite for the Subaru engine control unit that lets you view and log data and tune the ECU.
- π° Intrepid Tools - Expensive, but extremely versatile tools specifically designed for reversing CAN and other vehicle communication protocols.
- O2OO - Works with the ELM327 to record data to a SQLite database for graphing purposes. It also supports reading GPS data. You can connect this to your car and have it map out using Google Maps KML data where you drive.
- CANToolz - CANToolz is a framework for analysing CAN networks and devices. It is based on several modules which can be assembled in a pipeline.
- BUSMASTER -An Open Source tool to simulate, analyze and test data bus systems such as CAN, LIN, FlexRay.
Libraries and tools that don't fall under the larger class of applications above.
- SocketCAN Utils - Userspace utilites for SocketCAN on Linux.
- vircar - a Virtual car userspace that sends CAN messages based on SocketCAN
- π CANard - A Python framework for Controller Area Network applications.
- Caring Caribou - Intended to be the nmap of vehicle security.
- c0f - A fingerprinting tool for CAN communications that can be used to find a specific signal on a CAN network when testing interactions with a vehicle.
- Python-CAN - Python interface to various CAN implementations, including SocketCAN. Allows you to use Python 2.7.x or 3.3.x+ to communicate over CAN networks.
- CANNiBUS - A Go server that allows a room full of researchers to simultaneously work on the same vehicle, whether for instructional purposes or team reversing sessions.
- CAN Simulator - A Go based CAN simulator for the Raspberry Pi to be used with PiCAN2 or the open source CAN Simulator board
- NodeJS extension to SocketCAN - Allows you to communicate over CAN networks with simple JavaScript functions.
Companies and job opportunities in the vehicle security field.
- UberATC - Uber Advanced Technologies Center - info@uberatc.com.
- Tesla - Tesla hires security professionals for a variety of roles, particularly securing their vehicles.
- Intrepid Control Systems - Embedded security company building tools for reversing vehicles.
- Rapid7 - Rapid7 does work in information, computer, and embedded security.
- IOActive - Security consulting firm that does work on pentesting hardware and embedded systems.
- General Motors on HackerOne - responsible disclosure submissions accepted
- Fiat Chrysler Automobiles on Bugcrowd - responsible disclosure submissions accepted
- Tesla Motors on Bugcrowd - submissions accepted, paid bounties offered
List of lists.
- Security
- Meta
Your contributions are always welcome! Please take a look at the contribution guidelines first.