Companies Home Search Profile

Automobile Hacking and Security v1.0

Focused View

Arsalan Saleem,Secure Techware

2:20:03

137 View
  • 1 - 00Introduction.mp4
    02:34
  • 2 - 02Course Structure.mp4
    02:21
  • 2 - 02-Course-Structure.pdf
  • 3 - 01Parallel Communication.mp4
    05:47
  • 3 - 01-Parallel-Communication.pdf
  • 4 - 02Serial Communication.mp4
    08:21
  • 4 - 02-Serial-Communication.pdf
  • 5 - 01Basics of CAN Protocol.mp4
    06:17
  • 5 - 01-Basics-of-CAN-Protocol.pdf
  • 6 - 02Implementation of CAN Protocol.mp4
    02:29
  • 6 - 02-Implementation-of-CAN-Protocol.pdf
  • 7 - 03CAN Data Frame.mp4
    04:43
  • 7 - 03-CAN-Data-Frame.pdf
  • 8 - 04Nodes in CAN Protocol.mp4
    04:47
  • 8 - 04-Nodes-in-CAN-Protocol.pdf
  • 9 - 05Sending data on CAN BUS.mp4
    06:14
  • 9 - 05-Sending-data-on-CAN-BUS.pdf
  • 10 - 06CAN Remote Frame.mp4
    02:13
  • 10 - 06-CAN-Remote-Frame.pdf
  • 11 - 01Installation.mp4
    05:01
  • 11 - 01-Installation.pdf
  • 11 - can-utils-commands.txt
  • 12 - 02Creating virtual CAN interface vcan0.mp4
    02:17
  • 12 - 02-Creating-virtual-CAN-interface-vcan0.pdf
  • 12 - creating-vcan0-interface.txt
  • 13 - 03CANUTILS Tool Set.mp4
    10:43
  • 13 - 03-CAN-UTILS-Tool-Set.pdf
  • 14 - 01Installation and Basic Functions of Car Simulator.mp4
    06:54
  • 14 - 01-Installation-and-Basic-Functions-of-Car-Simulator.txt
  • 15 - 02Dump CAN frames and Replay Attack.mp4
    06:03
  • 16 - 03Find CAN frames by Recursive Splitting Method.mp4
    09:19
  • 17 - 04Find CAN frames by CAN Sniff Method.mp4
    12:57
  • 18 - 05Send exact CAN frames by Cansend Method.mp4
    03:45
  • 19 - 01Hardware Required.mp4
    04:07
  • 19 - 01-Hardware-Required.pdf
  • 20 - 02Basics of Arduino.mp4
    10:21
  • 21 - 03Creating the Device.mp4
    02:36
  • 22 - 04Uploading CANUTILS code on Arduino.mp4
    05:17
  • 22 - 04-Uploading-CAN-UTILS-code-on-Arduino.pdf
  • 23 - 05Connecting Device with Real Vehicle.mp4
    01:53
  • 24 - 01Show CAN Packets on Serial Monitor.mp4
    02:35
  • 24 - 04-Uploading-CAN-UTILS-code-on-Arduino.pdf
  • 25 - 02Creating Physical CAN Interface CAN0.mp4
    04:34
  • 25 - can0-interface.txt
  • 26 - 03Dump CAN Frames from Real Network.mp4
    01:58
  • 27 - 04Reply Attack on Real Interface.mp4
    01:09
  • 28 - 05Sniffing CAN Frames from Real Interface.mp4
    02:03
  • 29 - Bonus Lecture.mp4
    00:45
  • 29 - Bonus-Section-Nov22.html
  • Description


    Find vulnerabilities loopholes and security threats in your own vehicle

    What You'll Learn?


    • Communication Protocol on which Modern Vehicles Operate
    • Basics of CAN (Controller Area Network)
    • Communicating with CAN Protocol
    • Implementing Virtual Car Simulator
    • Finding Different Types of Vulnerabilities in Virtual Car
    • Creating the Device to Communicate with Real Vehicle
    • Working on Real Car and Finding Vulnerabilities

    Who is this for?


  • For Cybersecurity Researchers
  • Ethical Hackers
  • Hobbyist and Learners
  • More details


    Description

    Have you ever thought the car you drive can also be hacked and it's also vulnerable to hackers ?

    Yes modern day vehicles are as vulnerable as your phone or your laptop even its vulnerability is much higher.

    Today’s modern vehicle is a complex set of microprocessors and microcontrollers which can be hacked just like computers.

    In this course we will see how modern vehicles can be hacked and how we can find vulnerabilities in it.

    Since this topic will be new to most of you, we will start this course from a very basic level.

    First we will look into the communication protocols of embedded systems and see how systems communicate with each other.

    After creating our base we will see Controller Area Network or CAN for short. CAN is the protocol on which modern vehicles operate so first we will look at this protocol and see how the protocol works, why we need this protocol and how vehicles operate on this protocol.

    After understanding Controller Area Network (CAN) we will install virtual car simulator so virtual simulator is similar to real car and we can do all the basic things on this simulator which we can do on real car so before moving to real vehicle first we will see how we can work on CAN protocol in virtual car. Also this section will be helpful to everyone so those who just want to learn automobile security without touching the real car can learn all the things from a virtual car simulator.

    After practicing on a virtual simulator we will move on to a real vehicle so first we will see all the hardware requirements and how to create the device to communicate with the car.

    After creating the device we will go into the real car and test the device. Then we will perform vulnerability tests on the real car which we did with a virtual car.

    We will cover this course on virtual car as well as on real car, so you will have a better understanding of vulnerabilities in automobiles.

    So this course is for ethical hackers, pentesters and all types of security researchers.


    Who this course is for:

    • For Cybersecurity Researchers
    • Ethical Hackers
    • Hobbyist and Learners

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Arsalan Saleem
    Arsalan Saleem
    Instructor's Courses
    I'm a Security Expert and Software Developer with 7+ years experience. I love to work on innovative offensive security ideas. I have developed many web application and mobile applications. I have also worked on security of many industrial software's. Currently I'm working on exploit research and use of deep learning with micro controllers in Penetration Testing.
    Secure Techware
    Secure Techware
    Instructor's Courses
    SecureTechware believes in the philosophy of innovation for serving the employees, clients and the community effectively. We believe in quality and reliability in order to deliver superior services. Whether it is new development, update or maintenance; our company has a potential to provide the best!Our vision is to be the innovation leader in the I.T. services. We are determined to have a company culture which is based on quality performance, respect and teamwork. We are a blend of passion and superior skills which helps us to accelerate our success. Our professional and quality services provide clients with competitive edge and success in the marketplace.Our top priority is client satisfaction. We keep on exploring innovative ideas for our clients in order to provide them with utmost satisfaction. We keep a friendly environment in our dealings with the clients. We are thrived to be the finest solution provider for you!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 29
    • duration 2:20:03
    • Release Date 2023/05/05