Companies Home Search Profile

Automobile Hacking and Security v2.0

Focused View

Arsalan Saleem,Secure Techware

3:18:20

161 View
  • 1. Introduction.mp4
    03:25
  • 2.1 hardware-requirements.pdf
  • 2. 02-Hardware Requirements.mp4
    06:00
  • 1.1 01-Overview of CAN Protocol.pdf
  • 1. 01-Overview of CAN Protocol.mp4
    03:25
  • 2.1 02-can-utils-commands.txt
  • 2.2 02-Overview of CAN-Utils.pdf
  • 2. 02-Overview of CAN-Utils.mp4
    06:00
  • 1.1 command.txt
  • 1. 01-Car Simulator Advance.mp4
    05:18
  • 1.1 01-Installing CaringCaribou.pdf
  • 1.2 canrc.zip
  • 1. 01-Installing CaringCaribou.mp4
    10:53
  • 2. 02-Capture and Replay Attack.mp4
    06:07
  • 3. 03-Get Unique IDs.mp4
    03:17
  • 4. 04-Fuzzer Brute Force.mp4
    22:31
  • 5. 05-Unified Diagnostics Services (UDS).mp4
    05:13
  • 1.1 01-Installing CANAnalyzer with Docker.pdf
  • 1. 01-Installing CANAnalyzer with Docker.mp4
    05:50
  • 2. 02-Starting CANAnalyzer tool.mp4
    08:47
  • 3. 03-Sniff and Send CAN Packets.mp4
    06:57
  • 4. 04-Packet Searcher.mp4
    04:53
  • 1.1 01-What is OBD2.pdf
  • 1. 01-What is OBD2.mp4
    01:34
  • 2.1 02-Types of OBD2 Protocols.pdf
  • 2. 02-Types of OBD2 Protocols.mp4
    04:25
  • 3. 03-Creating Universal OBD2 Connector.mp4
    05:20
  • 1.1 01-MCP2515 Module.pdf
  • 1.2 Mcp2515-Connection bb.pdf
  • 1.3 Mcp2515-Connection-withoutbreadboard bb.pdf
  • 1.4 Mcp2515-Uno bb.pdf
  • 1. 01-MCP2515 Module.mp4
    03:17
  • 2. 02-MCP2515 Device Variants.mp4
    03:09
  • 3.1 03-Arduino Device code for CAN-Utils.pdf
  • 3. 03-Arduino Device code for CAN-Utils.mp4
    04:07
  • 1. 01-Connecting Device with Car.mp4
    08:02
  • 2. 02-Capture and Replay.mp4
    02:10
  • 3. 03-Getting Unique IDS.mp4
    03:09
  • 1. 01-Final ECU Model with MCP2515.mp4
    02:23
  • 2.1 hardware-requirements.pdf
  • 2. 02-Hardware Requirements for ECU Model.mp4
    03:06
  • 3.1 Display Data on OLED.pdf
  • 3.2 hardware-requirements.pdf
  • 3.3 I2CAddressFinder.zip
  • 3.4 OLED bb.pdf
  • 3. 03-Display Data on OLED.mp4
    05:58
  • 4.1 ECU-Model.pdf
  • 4.2 SENDER bb.pdf
  • 4. 04-Sender Device.mp4
    07:43
  • 5.1 ECU-Model.pdf
  • 5.2 RECEIVER bb.pdf
  • 5. 05-Receiver Device.mp4
    09:23
  • 1. 01-MitM on ECU Model.mp4
    08:10
  • 2. 02-Sniffing Data and Reply.mp4
    07:59
  • 3. 03-Sending Specific CAN Packets.mp4
    02:34
  • 1. 01-Introduction and Precautions.mp4
    01:06
  • 2. 02-Tools for Soldering.mp4
    03:00
  • 3. 03-Basic rules of Soldering.mp4
    00:58
  • 4. 04-Soldering on Prototype Board.mp4
    03:11
  • 5. 05-Soldering Header Pins.mp4
    02:19
  • 6. 06-Soldering Wires.mp4
    02:36
  • 7. 07-Pad Surface Soldering.mp4
    02:28
  • 8. 08-Pinhole Soldering.mp4
    01:37
  • Description


    Find vulnerabilities loopholes and security threats in your own vehicle.

    What You'll Learn?


    • Overview of Car Protocol (CAN)
    • Implementing Advance Car Simulator
    • Finding Different Types of Vulnerabilities in Virtual Car
    • Advance Automotive Security Exploration Tools
    • On-Board Diagnostic II (OBD2) Concepts
    • Types of OBD2 Protocols
    • Creating OBD2 Connector
    • Creating Device 2.0 to Communicate with Real Vehicle
    • Working on Real Car and Finding Vulnerabilities
    • Creating Electronic Control Unit (ECU) Model
    • Reverse Engineering CAN Packets on ECU Model
    • Testing Security Tools and Finding Vulnerabilities in ECU Model

    Who is this for?


  • For Cybersecurity Researchers
  • Ethical Hackers
  • Hobbyist and Learners
  • Anyone passionate about Cyber Security, But! Can think out of the box!!!
  • More details


    Description

    Have you ever thought the car you drive can also be hacked and it's also vulnerable to hackers ?

    Welcome to the second course on Automobile Hacking and Security version 2.0.

    In our first course we created our base on automobile security, learned the protocol on which modern day vehicles operate and looked at tools through which we can find vulnerabilities in cars and worked on real vehicles as well.

    In this course we will look at some advanced and interesting concepts and see how deep the rabbit hole goes. We will start this course with the overview of the first course so all things revised and clear.

    Then we will implement a car simulator with higher difficulty levels and look for advanced tools on automobile security starting with CaringCaribou. We will see how we can find all the unique IDS in CAN Network. We will work on Unified Diagnostics Services (UDS) and also see Fuzzer Brute Force Attack.

    Then we will look at another advanced tool on automobile security CANAnalyzer which is a graphical tool. We will do Sniff and Send CAN Packets Attack and Fuzzer Test.

    After that we will cover On-Board Diagnostic II (OBD2). We will see OBD2 Protocols and create OBD2 Universal connectors as well to communicate with real vehicles.

    After that we will create a version 2.0 device with MCP2515 module to communicate with real vehicles and get real time data from cars.

    Then will do a practical demo on a real car with version 2.0 device and OBD2 connector.

    After that we will move to the very interesting part of this course in which we will create an Electronic Control Unit model ECU. This ECU unit will help us test all tools which we study in this course. We will also connect our version 2.0 device with this ECU unit and try to Reverse Engineer CAN Frames.

    In the last one important thing this course is NOT for everyone But for anyone who is passionate about cybersecurity and has the ability to think out of the BOX!


    Who this course is for:

    • For Cybersecurity Researchers
    • Ethical Hackers
    • Hobbyist and Learners
    • Anyone passionate about Cyber Security, But! Can think out of the box!!!

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Arsalan Saleem
    Arsalan Saleem
    Instructor's Courses
    I'm a Security Expert and Software Developer with 7+ years experience. I love to work on innovative offensive security ideas. I have developed many web application and mobile applications. I have also worked on security of many industrial software's. Currently I'm working on exploit research and use of deep learning with micro controllers in Penetration Testing.
    Secure Techware
    Secure Techware
    Instructor's Courses
    SecureTechware believes in the philosophy of innovation for serving the employees, clients and the community effectively. We believe in quality and reliability in order to deliver superior services. Whether it is new development, update or maintenance; our company has a potential to provide the best!Our vision is to be the innovation leader in the I.T. services. We are determined to have a company culture which is based on quality performance, respect and teamwork. We are a blend of passion and superior skills which helps us to accelerate our success. Our professional and quality services provide clients with competitive edge and success in the marketplace.Our top priority is client satisfaction. We keep on exploring innovative ideas for our clients in order to provide them with utmost satisfaction. We keep a friendly environment in our dealings with the clients. We are thrived to be the finest solution provider for you!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 39
    • duration 3:18:20
    • Release Date 2023/05/05