Remotely Hacking a car through an OBD-II Bluetooth Dongle

  Переглядів 3,603

Automotive Security Research Group

Automotive Security Research Group

День тому

If you like to know more about ASRG, look at our quick introduction at • Intro to ASRG , visit our webpage at www.asrg.io or contact us directly.
PRESENTATION:
In this presentation, we will first discuss the potential attack vectors that could be used to remotely attack a car. Next, we will give a brief introduction to the OBD-II Bluetooth dongle that we have tried to hack. We will discuss the various vulnerabilities that we have discovered on this dongle, including mobile apps, Bluetooth pairing, firmware, and hardware. We will explain how we leveraged a development backdoor to bypass the hardware protection and dump the firmware, tampered with the mobile apps, exploited Bluetooth communication, abused the over-the-air update mechanisms, and sent forged CAN bus messages to achieve remote car controlling.
PRESENTERS:
Aaron Luo Aaron Luo is a security researcher at VicOne's Automotive Cyberthreat Research Lab. He joined VicOne's parent company, Trend Micro, in 2015. He is actively involved in the information security communities in Taiwan and frequently shares his experiences with academia, industry, government agencies, and international conferences.
Spencer Hsieh is a security researcher at VicOne’s Automotive Cyberthreat Research Lab. He joined VicOne’s parent company, Trend Micro, in 2009.
He has presented research at several security conferences. His areas of expertise include automotive cybersecurity, advanced persistent threat, malware analysis, and exploitation techniques. His current research focuses on areas of automotive cybersecurity and emerging threat.
PRESENTATION SLIDES:
garage.asrg.io/webinars/remot...

КОМЕНТАРІ: 7
@johnboscovijayanand
@johnboscovijayanand 9 місяців тому
Good one and an eye opener!
@newtimeageful9969
@newtimeageful9969 9 місяців тому
want to see more in the future
@iam1smiley1
@iam1smiley1 27 днів тому
These dongles are also marketed for rust prevention and insurance companies are also encouraging there use to monitor drivers for "discounts" (which should be stopped). I did quality control for a large bodyshop and was really surprised how many vehicles came through the shop with something plugged into the DLC when I needed to hook up a scan tool. Also, with the proliferation of cheap Chinese scan tools on the market...I really wonder when someone will hack the scan tools themselves (CCP even), every mechanic around has a cheap Chinese scan tool in their arsenal and could easily be vectors used to spread custom malware for each model of vehicle to later be triggered if chosen.
@mohammedshine2372
@mohammedshine2372 9 місяців тому
Good video
@user-om7zn6wv4t
@user-om7zn6wv4t 9 місяців тому
I can't understand how to bypass the firewire integrity check😅
@renakunisaki
@renakunisaki 9 місяців тому
I can barely understand what's being said. Especially one speaker has a lot of background noise.
@automotivesecurityresearch1613
@automotivesecurityresearch1613 9 місяців тому
Thanks for the feedback @renakunisaki, we will work on making sure the audio on future videos is better. Apologies.
Automation of Automotive Security Lifecycle Testing
36:35
Automotive Security Research Group
Переглядів 597
How to hack your car | Part 1 - The basics of the CAN bus
16:57
Adam Varga
Переглядів 274 тис.
BRAWLER MUTATIONS WILL BREAK THE GAME! - Brawl Talk
09:34
Brawl Stars
Переглядів 25 млн
How to get a FREE HYPERCHARGE SKIN!
02:07
Brawl Stars
Переглядів 13 млн
Hacking the CAN Bus: Presentation
42:37
Roderick Currie
Переглядів 55 тис.
What Are The Types Of Penetration Testing? | PurpleSec
17:14
PurpleSec
Переглядів 17 тис.
OBD2: The Bi-Directional Myth (Software Design)
19:01
Roudter
Переглядів 34 тис.
The Best OBD2 Dongle Under $150
16:37
Tools Tested
Переглядів 8 тис.
Hacking my Roommates Car - Linux CAN Bus sniffing
4:50
The EV Engineer
Переглядів 17 тис.
CAN Bus: A Beginners Guide Part 1
37:36
Hardwire Electronics
Переглядів 268 тис.
How Chips That Power AI Work | WSJ Tech Behind
6:29
The Wall Street Journal
Переглядів 323 тис.
Mysterious AI Robot "Astribot S1" SHOCKS Everyone
16:18
AI Search
Переглядів 21 тис.
План хакера 🤯 #shorts #фильмы
0:59
BruuHub
Переглядів 980 тис.